[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110704744A - Method and device for recommending target object to user and electronic equipment - Google Patents

Method and device for recommending target object to user and electronic equipment Download PDF

Info

Publication number
CN110704744A
CN110704744A CN201910945089.1A CN201910945089A CN110704744A CN 110704744 A CN110704744 A CN 110704744A CN 201910945089 A CN201910945089 A CN 201910945089A CN 110704744 A CN110704744 A CN 110704744A
Authority
CN
China
Prior art keywords
identity
library
target
alternative
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910945089.1A
Other languages
Chinese (zh)
Inventor
金淼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201910945089.1A priority Critical patent/CN110704744A/en
Publication of CN110704744A publication Critical patent/CN110704744A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses a method and a device for recommending a target object to a user and electronic equipment, relates to the technical field of computers, and can actively recommend the target object which may be interested to the user, thereby effectively improving the user experience. The method comprises the following steps: acquiring a first object identification library corresponding to a target user, wherein the first object identification library stores the identity of a first object processed by the target user; screening out at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user; searching for alternative identity identifiers which do not exist in the first object identifier library in the screened alternative object identifier library; and recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommendation rule. The method and the device are suitable for recommending the target object which may be interested by the user.

Description

Method and device for recommending target object to user and electronic equipment
Technical Field
The present invention relates to computer technologies, and in particular, to a method and an apparatus for recommending a target object to a user, and an electronic device.
Background
In some application software, some materials carrying different information are often provided for a user to select the materials according to the preference of the user, however, as the amount of the materials provided by the application software to the user increases, the user often needs to browse a large amount of materials before finding a favorite target object. For example, in some leisure games like coloring pictures, each player has a preference for each type of pattern, that is, the preferred pattern style of each player may be different, however, in the current coloring games, the pictures are classified only according to the content of the pictures in each picture, and when a player selects a picture, the player still needs to browse a large number of pictures from the picture library to find the preferred picture, which causes a problem of poor user experience.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, and an electronic device for recommending a target object to a user, which can actively recommend a target object that may be interested in the user, and effectively improve user experience.
In a first aspect, an embodiment of the present invention provides a method for recommending a target object to a user, where the method includes: acquiring a first object identification library corresponding to a target user, wherein the first object identification library stores the identity of a first object processed by the target user; screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one; searching for alternative identity identifiers which do not exist in the first object identifier library in the screened alternative object identifier library; and recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommendation rule.
Optionally, the recommending, according to a recommendation rule, a target object corresponding to at least a part of the candidate identity to the target user includes: counting a recommended value of a target object corresponding to the alternative identity, wherein the recommended value of the target object is positively correlated with the number of the alternative object identity libraries in which the alternative identity is stored; sequencing the target objects according to the sequence of the recommended values from large to small; recommending the target objects arranged at the top N positions to the target user, wherein N is a positive integer.
Optionally, before obtaining the first object identifier library corresponding to the target user, the method further includes: and storing the identity of the first object into the first object identity library according to the processing operation of the target user on the first object.
Optionally, before the storing the identity of the first object into the first object identifier library according to the processing operation of the target user on the first object, the method further includes: respectively mapping a preset number of identity identifications into different bits in binary numbers with preset number of bits, wherein the preset number is equal to the preset number of bits; the storing the identity of the first object into the first object identity library according to the processing operation of the target user on the first object comprises: configuring bits corresponding to the identity of the first object in the binary number according to the processing operation of a target user on the first object to form a first number; saving the first number in the first object identification repository.
Optionally, after saving the first number in the first object identifier library, the method further includes: updating the first number according to the processing operation of a target user on a new object; the updating the first number comprises: configuring a bit in the first number corresponding to the identity of the new object.
Optionally, the screening, in each second object identifier library corresponding to other users except the target user, an alternative object identifier library stored with at least one identity identifier same as that stored in the first object identifier library, includes: and executing the following operations on a second object identification library corresponding to each other user: extracting a second number in the second object identification library, wherein the configured bits in the second number are respectively mapped to the identity identifications stored in the second object identification library; performing a bit logic operation on the first number and the second number; determining whether the second object identification library and the first object identification library have at least one identity which is the same as the identity or not according to the operation result; and if so, taking the second object identification library as an alternative object identification library.
Optionally, the searching for the candidate identifiers that do not exist in the first object identifier library in the screened candidate object identifier library includes: for each identity in each candidate identification library, performing the following operations: configuring the bits corresponding to the identity in the binary number to form an identification number; performing a bit logic operation on the first number and the identification number; determining whether the identity is stored in the first object identifier library or not according to the operation result; if not, the identity is taken as an alternative identity.
Optionally, the bit logic operation includes: when both the first number and the second number/identification number are positive logic, the bit logic operation is a logical and; when both the first number and the second number/identification number are negative logic, the bit logic operation is a logical OR.
In a second aspect, an embodiment of the present invention further provides an apparatus for recommending a target object to a user, including: the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first object identification library corresponding to a target user, and the first object identification library stores the identity of a first object processed by the target user; the screening module is used for screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one; the searching module is used for searching the selected alternative object identification library for alternative identity identifications which do not exist in the first object identification library; and the recommending module is used for recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommending rule.
Optionally, the recommending module includes: the statistical unit is used for counting the recommended value of the target object corresponding to the alternative identity, and the recommended value of the target object is positively correlated with the number of the alternative object identity libraries in which the alternative identity is stored; the sorting unit is used for sorting the target objects according to the descending order of the recommended values; and the recommending unit recommends the target objects arranged at the top N bits to the target user, wherein N is a positive integer.
Optionally, the apparatus further comprises: and the storage module is used for storing the identity of the first object into the first object identifier library according to the processing operation of the target user on the first object.
Optionally, the apparatus further comprises: the mapping module is used for mapping the preset number of the identity identifications into different bits in binary numbers with preset number of bits respectively, wherein the preset number is equal to the preset number of the bits; the saving module comprises: the first configuration unit is used for configuring bits corresponding to the identity identifier of the first object in the binary number according to the processing operation of a target user on the first object to form a first number; a saving unit, configured to save the first number in the first object identifier library.
Optionally, the saving module further includes: the updating unit is used for updating the first number according to the processing operation of a target user on a new object; the updating the first number comprises: configuring a bit in the first number corresponding to the identity of the new object.
Optionally, the screening module is specifically configured to: and executing the following operations on a second object identification library corresponding to each other user: extracting a second number in the second object identification library, wherein the configured bits in the second number are respectively mapped to the identity identifications stored in the second object identification library; performing a bit logic operation on the first number and the second number; determining whether the second object identification library and the first object identification library have at least one identity which is the same as the identity or not according to the operation result; and if so, taking the second object identification library as an alternative object identification library.
Optionally, the search module is specifically configured to: for each identity in each candidate identification library, performing the following operations: configuring the bits corresponding to the identity in the binary number to form an identification number; performing a bit logic operation on the first number and the identification number; determining whether the identity is stored in the first object identifier library or not according to the operation result; if not, the identity is taken as an alternative identity.
Optionally, the bit logic operation includes: when both the first number and the second number/identification number are positive logic, the bit logic operation is a logical and; when both the first number and the second number/identification number are negative logic, the bit logic operation is a logical OR.
In a third aspect, an embodiment of the present invention further provides an electronic device, including: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for executing any one of the methods for recommending a target object to a user provided by the embodiments of the present invention.
In a fourth aspect, embodiments of the present invention also provide a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement any of the methods for recommending a target object to a user provided by the embodiments of the present invention.
According to the method, the device, the electronic equipment and the storage medium for recommending the target object to the user, provided by the embodiment of the invention, the first object identification library corresponding to the target user is obtained, and the identity of the first object processed by the target user is stored in the first object identification library; screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one; searching for alternative identity identifiers which do not exist in the first object identifier library in the screened alternative object identifier library; and recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommendation rule. Therefore, the alternative identity identification library corresponding to the user with the same or similar preference as the target user can be found out from other users except the target user, the alternative identity identification which is not processed by the target user can be found out from the alternative identity identification library, and the target user is very likely to be interested in the target object corresponding to the alternative identity identification since the target user and the other users corresponding to the alternative identity identification library have the same or similar preference, at least a part of the target object is actively recommended to the target user, so that the time for the target user to search the target object interested in the target user can be reduced, the experience of the target user is greatly improved, and the retention rate of the application program is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for recommending a target object to a user according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an apparatus for recommending a target object to a user according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In a first aspect, an embodiment of the present invention provides a method for recommending a target object to a user, which can actively recommend a target object that may be interested in the user, and effectively improve user experience.
As shown in fig. 1, a method for recommending a target object to a user according to the present invention may include:
step 101, obtaining a first object identification library corresponding to a target user, wherein an identity of a first object processed by the target user is stored in the first object identification library;
in this step, the target user may be a user of a certain application software, and the first object may be a material provided by the application software to the target user, for example, in some image coloring leisure game software, a large amount of image materials may be provided to the user for the user to select, at this time, the first object processed by the target user may be an image colored by the target user, or an image selected by the target user, or an image browsed by the target user. Optionally, the first object may also be another user of the application software, for example, for the application software such as a microblog or a small red book, the first object processed by the target user may be another user concerned by the target user, or another user browsed by the target user.
In this embodiment, each object in the application software may have an identity, the identities of the objects are different from each other, and the identity may be an ID (identity, identity number, or account number) of the object corresponding to the identity; each user of the application software may correspond to an object identification library, the users correspond to the object identification libraries one to one, the object identification library of the user stores the identity of the object processed by the user, and the number of the objects processed by the user may be one or more. When recommending a target object to the target user, the number of the first objects processed by the target user may also be one or more.
Optionally, before obtaining the first object identifier library corresponding to the target user, the method may further include: and storing the identity of the first object into the first object identity library according to the processing operation of the target user on the first object.
In this embodiment, when the application software is a piece of leisure game software of a coloring class for pictures, the processing operation of the target user on the first object may include: the target user performs coloring completion operation, clicking operation or browsing operation on the first object; when the application software is application software such as microblog, small red book, social category known to be equivalent, the processing operation of the target user on the first object may include: and the target user performs attention operation or browsing operation on the first object.
In this embodiment, the target user generally performs the processing operation on an object that is interested in the target user, so that in this embodiment, the identity of the first object processed by the target user is stored in a first object identifier library corresponding to the target user, and the identity of the first object that is most likely to be interested in the target user can be recorded in the first object identifier library, so that in a subsequent step, another object that is likely to be interested in the target user can be found according to the identity in the first object identifier library.
As an optional implementation manner of the foregoing embodiment, before the storing the identity of the first object into the first object identifier library according to the processing operation of the target user on the first object, the method may further include: respectively mapping a preset number of identity identifications into different bits in binary numbers with preset number of bits, wherein the preset number is equal to the preset number of bits; the storing the identity of the first object into the first object identity library according to the processing operation of the target user on the first object comprises: and configuring bits corresponding to the identity of the first object in the binary number according to the processing operation of the target user on the first object to form a first number, and storing the first number in the first object identity library.
In this embodiment, the preset number of the identifiers is equal to the number of the objects provided by the application program corresponding to the target user to the user. In this embodiment, each of the identifiers may be numbered, and each bit of the binary number is mapped to a number corresponding to each identifier in sequence from left to right or from right to left. Wherein the numbering may be in the order of natural numbers.
For example, in one embodiment of the present invention, the identification includes a first identification, a second identification, a third identification and a fourth identification, and the fourth identification is numbered as 1, the third identification is numbered as 2, the first identification is numbered as 3, and the second identification is numbered as 4; mapping each bit of the binary number 0000 to a number corresponding to each id in a right-to-left order, where the fourth id corresponds to the 1 st bit of the binary number 0000, the third id corresponds to the 2 nd bit of the binary number 0000, the first id corresponds to the 3 rd bit of the binary number 0000, and the second id corresponds to the 4 th bit of the binary number 0000.
Of course, the numbers may be in other orders or random orders as long as the numbers of the identifiers are different from each other.
Optionally, in the above embodiment, the first identity identifier corresponds to the first object, and at this time, if the target user performs a processing operation on the first object, according to the processing operation on the first object by the target user, the 3 rd bit in the binary number 0000 may be configured to be 1, so as to form a first number 0100, and store the first number 0100 in the first object identifier library.
It can be understood that, after the first number is stored in the first object identifier library, when the target user performs a processing operation on a new object, the first number may be updated according to the processing operation on the new object by the target user; the updating the first number comprises: configuring a bit in the first number corresponding to the identity of the new object. For example, the first object identifier library already stores the first number 0100, at this time, if the target user performs a processing operation on the new object and the identity of the new object corresponds to the 2 nd bit of the binary number, the 2 nd bit in the first number 0100 is configured to be 1 according to the processing operation on the new object by the target user, so as to form a new first number 0110, and the new first number 0110 is stored in the first object identifier library.
In this embodiment, the identity identifiers are respectively mapped to different bits in a binary number and stored in the object identifier library in the form of the binary number, which greatly reduces the storage space occupied by the identity identifiers compared with the manner of directly storing the identity Identifiers (IDs) in the object identifier library in the prior art.
102, screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one;
in this step, the other users and the target user are users of the same application program, each of the second object identifier libraries corresponds to each of the other users one-to-one, and when the number of the screened candidate object identifier libraries is one, the candidate object identifier library corresponds to one of the other users; and when the screened candidate object identification libraries are in a plurality, each candidate object identification library corresponds to one other user.
In this embodiment, the number of the same identity identifiers may be set to be M, where M is a positive integer; at this time, candidate object identifier libraries which store M same identity identifiers as the first object identifier library may be screened from each of the second object identifier libraries, where the larger the value of M, the more identity identifiers in the candidate object identifier libraries which are the same as those in the first object identifier library are, that is, the higher the degree of coincidence between the user corresponding to the candidate object identifier library and the object interested by the target user is, which indicates that the user corresponding to the candidate object identifier library and the target user are very likely to have the same or similar preference.
Optionally, as in the foregoing embodiment, when the identifiers are respectively mapped to different bits in a binary number and stored in the object identifier library in a binary number form, screening, in each second object identifier library corresponding to other users except the target user, an alternative object identifier library in which at least one same identifier is stored in the first object identifier library may include: and executing the following operations on a second object identification library corresponding to each other user: extracting a second number in the second object identification library, wherein the configured bits in the second number are respectively mapped to the identity identifications stored in the second object identification library; performing a bit logic operation on the first number and the second number; determining whether the second object identification library and the first object identification library have at least one identity which is the same as the identity or not according to the operation result; and if so, taking the second object identification library as an alternative object identification library.
In this embodiment, it should be understood that a forming method of the second number in the second object identifier library corresponding to each other user is similar to a forming method of the first number in the first identity identifier library, and is not described herein again. The number of the other users can be one or more, and when the number of the other users is more, second numbers in a second object identification library corresponding to each other user are sequentially extracted; when the first digit and the second digit are subjected to bit logic operation, the second digit and the first digit are subjected to bit logic operation respectively, so that whether a second object identification library corresponding to each second digit and the first object identification library store at least one identity which is the same as the identity is determined.
The bit logic operation may include: when both the first number and the second number are positive logic (that is, a bit of 1 in a binary number stored in the object identifier library indicates that an identity corresponding to the bit is stored in the object identifier library), the bit logic operation is "logical and"; for example, if the first number is 0100110, the second number is 1000111, and the first number and the second number are both positive logics, then performing a bit logic operation on the first number 0100110 and the second number 1000111 to obtain a number 000110, and then determining that the object identifier library corresponding to the second number 1000111 and the first object identifier library hold 2 identical identifiers according to the number of bits of 1 in the number 000110, or determining that the object identifier library corresponding to the second number and the first object identifier library hold at least one identical identifier when the number obtained after the bit operation is not 0.
When both the first number and the second number are negative logic (that is, a bit of 0 in the binary number stored in the object identifier library indicates that the identity corresponding to the bit is stored in the object identifier library), the bit logic operation is "logical or". For example, the first number is 0100110, the second number is 1000111, and both the first number and the second number are negative logics, then performing a bit logic operation on the first number 0100110 and the second number 1000111 to obtain a number 1100111, and then determining that the object identifier library corresponding to the second number 1000111 and the first object identifier library hold 2 identical identifiers according to the number of bits that are 0 in the number 1100111, or determining that the object identifier library corresponding to the second number and the first object identifier library hold at least one identical identifier when a bit that is 0 exists in the binary number obtained after the bit operation.
Therefore, the scheme that the identity identifiers are respectively mapped into different bits in the binary number and stored in the object identifier library in the form of the binary number can greatly reduce the storage space occupied by the identity identifiers and can also screen the second object identifier library by using a bit operation algorithm, thereby greatly improving the screening speed.
As an optional implementation manner of the foregoing embodiment, the target user and the other users may be users of specified game software, and the first object and the target object are game materials provided by the specified game software to the users.
In this embodiment, for example, the designated game software may be the leisure game software with colors like pictures as described above, where the game material provided by the designated game software to the user is a picture; the designated game software may also be music game software such as a rhythm master, and the game material provided by the designated game software to the user is music. Of course, the specific game software described in the embodiments of the present invention is not limited thereto.
103, searching for an alternative identity which does not exist in the first object identification library in the screened alternative object identification library;
in this step, the candidate identification may be found out by comparing the identification in the first object identification library with the identification in the candidate object identification library one by one. It can be understood that, when the number of the candidate object identifier libraries is one, the identity identifiers in the candidate object identifier library, which are different from the identity identifiers in the first object identifier library, may be found out; when the number of the candidate object identifier libraries is multiple, the identity identifiers in each of the candidate object identifier libraries, which are different from the identity identifiers in the first object identifier library, need to be found out.
Optionally, as in the foregoing embodiment, when the identifiers are respectively mapped to different bits in a binary number and stored in the object identifier library in the form of a binary number, the searching for the candidate identifiers that do not exist in the first object identifier library in the screened candidate object identifier library includes: for each identity in each candidate identification library, performing the following operations: configuring the bits corresponding to the identity in the binary number to form an identification number; performing a bit logic operation on the first number and the identification number; determining whether the identity is stored in the first object identifier library or not according to the operation result; if not, the identity is taken as an alternative identity.
In this embodiment, the number of the identifiers in each candidate object identifier library may be one or more, and when the number of the identifiers is multiple, one identification number corresponding to each identifier is configured for each identifier; for example, the number of bits of the binary number is 8, the number of the identifiers is 5, and 5 second identifiers respectively correspond to bits 1 to 5 of the binary number, so that the formed 5 identifiers are 00000001, 00000010, 00000100, 00001000, and 00010000 respectively.
In the above embodiment, the bit logic operation may include: when the identification number and the first number are both positive logic, the bit logic operation is logical and; when both the identification number and the first number are negative logic, the bit logic operation is a logical OR. The specific algorithm of the bit logic operation has been explained in detail in the embodiments listed above, and only the scenario when the identification number and the first number are both positive logic is briefly described here: in the above embodiment, when the first number is 01110001, after performing a logical and operation on the identification number 00000010 and the first number 01110001 to obtain a number 0, it is determined that the identity corresponding to the identification number 00000010 does not exist in the first identity library; and performing logical and operation on the identification number 00010000 and the first number 01110001 to obtain a number 00010000 which is not 0, and determining that the identification corresponding to the identification number 00010000 exists in the first identification library.
And 104, recommending at least one part of target objects corresponding to the alternative identity identifiers to the target user according to a recommendation rule.
In this step, as described above, other users corresponding to the candidate object identifier library are most likely to have the same or similar preferences as the target user, and therefore, a target object in the candidate object identifier library corresponding to a different identifier (i.e., the candidate identifier) in the first object identifier library is most likely to be an object of interest to the target user, so that at least a part of the target object is actively recommended to the target user, which can reduce the time for the target user to search for the target object of interest, thereby improving the experience of the target user and increasing the retention rate of the application program.
As an optional implementation manner of the foregoing embodiment, the recommending, according to a recommendation rule, a target object corresponding to at least a part of the candidate identity to the target user may include: counting a recommended value of a target object corresponding to the alternative identity, wherein the recommended value of the target object is positively correlated with the number of the alternative object identity libraries in which the alternative identity is stored; sequencing the target objects according to the sequence of the recommended values from large to small; recommending the target objects arranged at the top N positions to the target user, wherein N is a positive integer.
In this embodiment, the recommendation value of the target object is positively correlated with the number of the candidate object identifier libraries in which the candidate identity identifiers are stored, so that the target object processed by most users who have the same or similar preference as the target user can be recommended to the user, and the probability that the target object recommended to the target user is the object of interest of the target user is improved.
Optionally, in the above embodiment, the counting the recommended value of the target object corresponding to the candidate identity may include: sequentially judging whether the alternative identity is stored in each alternative object identification library; and if so, adding 1 to the recommended value of the target object corresponding to the alternative identity.
In the method for recommending a target object to a user provided by this embodiment, a first object identifier library corresponding to a target user is obtained, and an identity of a first object processed by the target user is stored in the first object identifier library; screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one; searching for alternative identity identifiers which do not exist in the first object identifier library in the screened alternative object identifier library; and recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommendation rule. Therefore, the alternative identity identification library corresponding to the user with the same or similar preference as the target user can be found out from other users except the target user, the alternative identity identification which is not processed by the target user can be found out from the alternative identity identification library, and the target user is very likely to be interested in the target object corresponding to the alternative identity identification since the target user and the other users corresponding to the alternative identity identification library have the same or similar preference, at least a part of the target object is actively recommended to the target user, so that the time for the target user to search the target object interested in the target user can be reduced, the experience of the target user is greatly improved, and the retention rate of the application program is improved.
In a second aspect, an embodiment of the present invention further provides a device for recommending a target object to a user, which can actively recommend a target object that may be interested in the user to the user, so as to effectively improve user experience.
As shown in fig. 2, an embodiment of the present invention further provides an apparatus for recommending a target object to a user, including: an obtaining module 21, configured to obtain a first object identifier library corresponding to a target user, where an identity of a first object processed by the target user is stored in the first object identifier library; a screening module 22, configured to screen, from second object identifier libraries corresponding to users other than the target user, at least one candidate object identifier library that is stored with the same identity as the first object identifier library, where the number of the screened candidate object identifier libraries is at least one; a searching module 23, configured to search, in the screened candidate object identifier library, for a candidate identity that does not exist in the first object identifier library; and the recommending module 24 is configured to recommend the target object corresponding to at least a part of the candidate identity to the target user according to a recommending rule.
In the apparatus for recommending a target object to a user provided in this embodiment, a first object identifier library corresponding to a target user is obtained, where an identity of a first object processed by the target user is stored in the first object identifier library; screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one; searching for alternative identity identifiers which do not exist in the first object identifier library in the screened alternative object identifier library; and recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommendation rule. Therefore, the alternative identity identification library corresponding to the user with the same or similar preference as the target user can be found out from other users except the target user, the alternative identity identification which is not processed by the target user can be found out from the alternative identity identification library, and the target user is very likely to be interested in the target object corresponding to the alternative identity identification since the target user and the other users corresponding to the alternative identity identification library have the same or similar preference, at least a part of the target object is actively recommended to the target user, so that the time for the target user to search the target object interested in the target user can be reduced, the experience of the target user is greatly improved, and the retention rate of the application program is improved.
Optionally, the recommending module includes: the statistical unit is used for counting the recommended value of the target object corresponding to the alternative identity, and the recommended value of the target object is positively correlated with the number of the alternative object identity libraries in which the alternative identity is stored; the sorting unit is used for sorting the target objects according to the descending order of the recommended values; and the recommending unit recommends the target objects arranged at the top N bits to the target user, wherein N is a positive integer.
Optionally, the apparatus further comprises: and the storage module is used for storing the identity of the first object into the first object identifier library according to the processing operation of the target user on the first object.
Optionally, the apparatus further comprises: the mapping module is used for mapping the preset number of the identity identifications into different bits in binary numbers with preset number of bits respectively, wherein the preset number is equal to the preset number of the bits; the saving module comprises: the first configuration unit is used for configuring bits corresponding to the identity identifier of the first object in the binary number according to the processing operation of a target user on the first object to form a first number; a saving unit, configured to save the first number in the first object identifier library.
Optionally, the saving module further includes: the updating unit is used for updating the first number according to the processing operation of a target user on a new object; the updating the first number comprises: configuring a bit in the first number corresponding to the identity of the new object.
Optionally, the screening module is specifically configured to: and executing the following operations on a second object identification library corresponding to each other user: extracting a second number in the second object identification library, wherein the configured bits in the second number are respectively mapped to the identity identifications stored in the second object identification library; performing a bit logic operation on the first number and the second number; determining whether the second object identification library and the first object identification library have at least one identity which is the same as the identity or not according to the operation result; and if so, taking the second object identification library as an alternative object identification library.
Optionally, the search module is specifically configured to: for each identity in each candidate identification library, performing the following operations: configuring the bits corresponding to the identity in the binary number to form an identification number; performing a bit logic operation on the first number and the identification number; determining whether the identity is stored in the first object identifier library or not according to the operation result; if not, the identity is taken as an alternative identity.
Optionally, the bit logic operation includes: when both the first number and the second number/identification number are positive logic, the bit logic operation is a logical and; when both the first number and the second number/identification number are negative logic, the bit logic operation is a logical OR.
In a third aspect, an embodiment of the present invention further provides an electronic device, which can actively recommend a target object that may be interested in a user, and effectively improve user experience.
Fig. 3 is a schematic structural diagram of an embodiment of an electronic device of the present invention, and as shown in fig. 3, the electronic device may include: the device comprises a shell 31, a processor 32, a memory 33, a circuit board 34 and a power circuit 35, wherein the circuit board 34 is arranged inside a space enclosed by the shell 31, and the processor 32 and the memory 33 are arranged on the circuit board 34; a power supply circuit 35 for supplying power to each circuit or device of the electronic apparatus; the memory 33 is used for storing executable program codes; the processor 32 executes a program corresponding to the executable program code by reading the executable program code stored in the memory 33, for executing the method described in any of the foregoing embodiments.
For the specific execution process of the above steps by the processor 32 and the steps further executed by the processor 32 by running the executable program code, reference may be made to the description of the foregoing embodiments, which are not described herein again.
The above electronic devices exist in a variety of forms, including but not limited to:
(1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) Ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include: PDA, MID, and UMPC devices, etc., such as ipads.
(3) A portable entertainment device: such devices can display and play multimedia content. This type of device comprises: audio, video players (e.g., ipods), handheld game consoles, electronic books, and smart toys and portable car navigation devices.
(4) A server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic equipment with data interaction function.
Accordingly, an embodiment of the present invention further provides a computer-readable storage medium, where one or more programs are stored, and the one or more programs can be executed by one or more processors to implement any one of the methods provided in the foregoing embodiments, so that the corresponding technical effects can also be achieved, which have been described in detail above and are not described herein again.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments.
In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
For convenience of description, the above devices are described separately in terms of functional division into various units/modules. Of course, the functionality of the units/modules may be implemented in one or more software and/or hardware implementations of the invention.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for recommending a target object to a user, comprising:
acquiring a first object identification library corresponding to a target user, wherein the first object identification library stores the identity of a first object processed by the target user;
screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one;
searching for alternative identity identifiers which do not exist in the first object identifier library in the screened alternative object identifier library;
and recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommendation rule.
2. The method according to claim 1, wherein recommending, according to a recommendation rule, a target object corresponding to at least a part of the candidate identities to the target user comprises:
counting a recommended value of a target object corresponding to the alternative identity, wherein the recommended value of the target object is positively correlated with the number of the alternative object identity libraries in which the alternative identity is stored;
sequencing the target objects according to the sequence of the recommended values from large to small;
recommending the target objects arranged at the top N positions to the target user, wherein N is a positive integer.
3. The method of claim 1, wherein prior to obtaining the first object identification repository corresponding to the target user, the method further comprises:
and storing the identity of the first object into the first object identity library according to the processing operation of the target user on the first object.
4. The method of claim 3, wherein before the saving the identity of the first object into the first object identity repository according to the processing operation of the first object by the target user, the method further comprises:
respectively mapping a preset number of identity identifications into different bits in binary numbers with preset number of bits, wherein the preset number is equal to the preset number of bits;
the storing the identity of the first object into the first object identity library according to the processing operation of the target user on the first object comprises:
configuring bits corresponding to the identity of the first object in the binary number according to the processing operation of a target user on the first object to form a first number;
saving the first number in the first object identification repository.
5. The method of claim 4, wherein after saving the first number in the first object identification repository, the method further comprises:
updating the first number according to the processing operation of a target user on a new object;
the updating the first number comprises:
configuring a bit in the first number corresponding to the identity of the new object.
6. The method according to claim 4, wherein the screening, from among the second object id libraries corresponding to users other than the target user, an object id library alternative to the first object id library that stores at least one identity, includes:
and executing the following operations on a second object identification library corresponding to each other user:
extracting a second number in the second object identification library, wherein the configured bits in the second number are respectively mapped to the identity identifications stored in the second object identification library;
performing a bit logic operation on the first number and the second number;
determining whether the second object identification library and the first object identification library have at least one identity which is the same as the identity or not according to the operation result;
and if so, taking the second object identification library as an alternative object identification library.
7. The method of claim 4, wherein the searching the filtered candidate object identifier library for candidate identities not in the first object identifier library comprises:
for each identity in each candidate identification library, performing the following operations:
configuring the bits corresponding to the identity in the binary number to form an identification number;
performing a bit logic operation on the first number and the identification number;
determining whether the identity is stored in the first object identifier library or not according to the operation result;
if not, the identity is taken as an alternative identity.
8. The method of claim 6 or 7, wherein the bit logic operation comprises:
when both the first number and the second number/identification number are positive logic, the bit logic operation is a logical and;
when both the first number and the second number/identification number are negative logic, the bit logic operation is a logical OR.
9. An apparatus for recommending a target object to a user, the apparatus comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first object identification library corresponding to a target user, and the first object identification library stores the identity of a first object processed by the target user;
the screening module is used for screening at least one alternative object identification library with the same identity identification stored in the first object identification library from second object identification libraries corresponding to other users except the target user, wherein the number of the screened alternative object identification libraries is at least one;
the searching module is used for searching the selected alternative object identification library for alternative identity identifications which do not exist in the first object identification library;
and the recommending module is used for recommending the target object corresponding to at least part of the alternative identity to the target user according to a recommending rule.
10. The apparatus of claim 9, wherein the recommendation module comprises:
the statistical unit is used for counting the recommended value of the target object corresponding to the alternative identity, and the recommended value of the target object is positively correlated with the number of the alternative object identity libraries in which the alternative identity is stored;
the sorting unit is used for sorting the target objects according to the descending order of the recommended values;
and the recommending unit recommends the target objects arranged at the top N bits to the target user, wherein N is a positive integer.
CN201910945089.1A 2019-09-30 2019-09-30 Method and device for recommending target object to user and electronic equipment Pending CN110704744A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910945089.1A CN110704744A (en) 2019-09-30 2019-09-30 Method and device for recommending target object to user and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910945089.1A CN110704744A (en) 2019-09-30 2019-09-30 Method and device for recommending target object to user and electronic equipment

Publications (1)

Publication Number Publication Date
CN110704744A true CN110704744A (en) 2020-01-17

Family

ID=69197748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910945089.1A Pending CN110704744A (en) 2019-09-30 2019-09-30 Method and device for recommending target object to user and electronic equipment

Country Status (1)

Country Link
CN (1) CN110704744A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368208A (en) * 2020-03-19 2020-07-03 北京金山安全软件有限公司 Method and device for recommending target object to user and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100153292A1 (en) * 2008-12-11 2010-06-17 Microsoft Corporation Making Friend and Location Recommendations Based on Location Similarities
CN102929959A (en) * 2012-10-10 2013-02-13 杭州东信北邮信息技术有限公司 Book recommendation method based on user actions
CN104008138A (en) * 2014-05-08 2014-08-27 南京邮电大学 Music recommendation method based on social network
CN104992181A (en) * 2015-06-29 2015-10-21 昆明理工大学 Method for recommending books in real time according to habits of library user
CN106708821A (en) * 2015-07-21 2017-05-24 广州市本真网络科技有限公司 User personalized shopping behavior-based commodity recommendation method
CN109636545A (en) * 2018-12-26 2019-04-16 广州市耀锋电子网络科技有限公司 A kind of electric business platform commercial product recommending algorithm
CN109859004A (en) * 2019-01-10 2019-06-07 珠海金山网络游戏科技有限公司 A kind of Method of Commodity Recommendation and system based on historical data
CN110287421A (en) * 2019-06-28 2019-09-27 北京金山安全软件有限公司 Information content recommendation method and device and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100153292A1 (en) * 2008-12-11 2010-06-17 Microsoft Corporation Making Friend and Location Recommendations Based on Location Similarities
CN102929959A (en) * 2012-10-10 2013-02-13 杭州东信北邮信息技术有限公司 Book recommendation method based on user actions
CN104008138A (en) * 2014-05-08 2014-08-27 南京邮电大学 Music recommendation method based on social network
CN104992181A (en) * 2015-06-29 2015-10-21 昆明理工大学 Method for recommending books in real time according to habits of library user
CN106708821A (en) * 2015-07-21 2017-05-24 广州市本真网络科技有限公司 User personalized shopping behavior-based commodity recommendation method
CN109636545A (en) * 2018-12-26 2019-04-16 广州市耀锋电子网络科技有限公司 A kind of electric business platform commercial product recommending algorithm
CN109859004A (en) * 2019-01-10 2019-06-07 珠海金山网络游戏科技有限公司 A kind of Method of Commodity Recommendation and system based on historical data
CN110287421A (en) * 2019-06-28 2019-09-27 北京金山安全软件有限公司 Information content recommendation method and device and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368208A (en) * 2020-03-19 2020-07-03 北京金山安全软件有限公司 Method and device for recommending target object to user and electronic equipment

Similar Documents

Publication Publication Date Title
US11030202B2 (en) Method and device for recommendation of media content
CN106326391B (en) Multimedia resource recommendation method and device
CN106570157B (en) Picture pushing method and device and electronic equipment
CN106951571B (en) Method and device for labeling application with label
US11061948B2 (en) Method and system for next word prediction
CN109508391B (en) Input prediction method and device based on knowledge graph and electronic equipment
KR102108683B1 (en) Method for providing recommendation contents including non-interest contents
US20170242861A1 (en) Music Recommendation Method and Apparatus
CN105809471B (en) Method and device for acquiring user attribute and electronic equipment
CN109829073B (en) Image searching method and device
CN112087487A (en) Model training task scheduling method and device, electronic equipment and storage medium
CN105991583A (en) Game application recommendation method, application server, terminal and system
CN106844724B (en) Method and device for recommending applications based on applications installed by user
CN106202195A (en) Target push object pushing method and device and server
CN110652728A (en) Game resource management method and device, electronic equipment and storage medium
CN110704744A (en) Method and device for recommending target object to user and electronic equipment
CN110263318B (en) Entity name processing method and device, computer readable medium and electronic equipment
CN107748801B (en) News recommendation method and device, terminal equipment and computer readable storage medium
CN113961590A (en) Multi-source data fusion method and device and electronic equipment
CN111368208A (en) Method and device for recommending target object to user and electronic equipment
CN114329220A (en) Search result display method and device, computer equipment and storage medium
CN106599114A (en) Music recommendation method and system
CN105677926A (en) Local search result display method and device and electronic equipment
CN106527951A (en) Method and device for playing designated audio file and electronic equipment
CN109376298B (en) Data processing method and device, terminal equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200117

RJ01 Rejection of invention patent application after publication