<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>August</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Rethinking Conventional Collaborative Filtering for Recommending Daily Fashion Outfits</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Anders Kolstad, O¨ zlem O¨ zg o¨bek, Jon Atle Gulla</string-name>
          <email>andekol@stud.ntnu.no fozlem.ozgobek,jon.atle.gullag@ntnu.no</email>
          <email>jon.atle.gullag@ntnu.no</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Recommender Systems, Machine Learning, Fashion Recommenda-</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simon Litlehamar</string-name>
          <email>simon.litlehamar@accenture.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Accenture AS</institution>
          ,
          <addr-line>Fornebu</addr-line>
          ,
          <country country="NO">Norway</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Norwegian University of Science and Technology</institution>
          ,
          <addr-line>Trondheim</addr-line>
          ,
          <country country="NO">Norway</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>tion, Collaborative Filtering, Internet of ings</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <volume>27</volume>
      <issue>2017</issue>
      <fpage>22</fpage>
      <lpage>29</lpage>
      <abstract>
        <p>A conventional collaborative ltering approach using a standard utility matrix fails to capture the aspect of matching clothing items when recommending daily fashion outts. Moreover, it is challenged by the new user cold-start problem. In this paper, we describe a novel approach for guiding users in selecting daily fashion outts, by providing outt recommendations from a system consisting of an Internet of ings wardrobe enabled with RFID technology and a corresponding mobile application. We show where a conventional collaborative ltering approach comes short when recommending fashion outts, and how our novel approach-powered by machine learning algorithms-shows promising results in the domain of fashion recommendation. Evaluation of our novel approach using a real-world dataset demonstrates the system's eectiveness and its ability to provide daily outt recommendations that are relevant to the users. A non-comparable evaluation of the conventional approach is also given.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>CCS CONCEPTS</title>
      <p>•Information systems →Evaluation of retrieval results; Web
applications; •Computing methodologies →Classication and
regression trees;</p>
    </sec>
    <sec id="sec-2">
      <title>INTRODUCTION</title>
      <p>
        Selecting an outt every morning is a task that many people
struggle with, oen due to time constraints or the feeling of having
nothing to wear. In [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], Pruit argues that our selection of an outt
inuences other people’s impressions of us, and that it is of high
importance to our cultural lives. Moreover, the average Norwegian
has 359 unique garments in their closets [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. is suggests that
people need guidance and suggestions for selecting an outt from
their clothing haystack each morning.
      </p>
      <p>
        Klepp and Laitala found that 20% of clothes bought by
Norwegians were never or rarely used [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. A reason for this might be that
they did not actually like the item they bought or that the item did
not match any existing clothing items in their closet. is
information is very valuable to the clothing retailer. With such information,
the retailer can map the customer’s taste prole and generate
targeted ads for the customer, reducing the number of unnecessary
purchases, and increasing the number of satised customers.
      </p>
      <p>
        Generating such outt suggestions and targeted ads can be made
a reality by recommender systems. A recommender system tries to
predict the rating value of a user-item combination, where the user
has indicated their ratings for other items in the past [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. e system
tracks these ratings by receiving user feedback. User feedback
is classied into explicit and implicit. Explicit feedback is when
the user explicitly rates an item on, e.g., a 5-star scale. Implicit
feedback records other user interactions, e.g., how long a user
spends on a web page on a certain topic. With the retrieved ratings
by user feedback, the recommender system can predict the user’s
ratings of new items, and suggest the items with a high predicted
rating. One of the most successful recommendation technique is
called collaborative ltering (CF) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. CF recommends items on the
assumption that users who have interacted in similar ways before,
will have common interests in the future as well. Conventional CF
bases its recommendations from a matrix called the utility matrix,
which captures every rating value for the user-item combinations
known to the system [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Table 1 shows an example of such a
matrix, consisting of user-item combinations of users and movies.
A known challenge in CF is called new user cold-start problem. is
challenge is about how to recommend items to new users that have
not rated any items yet. Suppose we were to introduce a fourth
user in Table 1. e user-item combinations for this fourth user
would all have ’?’ as a value. How to then recommend items to this
user is not an easy task.
      </p>
      <p>
        Recommending individual items, such as in Table 1, is what
nearly all recommender systems are focusing on. In recent years,
recommendations of collections, such as music playlists [
        <xref ref-type="bibr" rid="ref12 ref13 ref23">12, 13, 23</xref>
        ],
has gained a lot of aention. Hansen and Golbeck identied some
key aspects that aects the recommendation of collections [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
One aspect that especially applies to outt recommendation is the
co-occurrence interaction eect. Matching clothing items (items
that go well together) will have a positive interaction eect when
they co-occur together, and will therefore generate a more relevant
outt recommendation to the user.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], we proposed Connected Closet, a system consisting of
an Internet of ings wardrobe enabled with an RFID reader, so
that clothing items with RFID tags can be checked in and out of
the closet, generating implicit feedback on clothing items the user
likes. Using a mobile application, the user can give explicit feedback
on outt he likes, and receive daily outt recommendations based
on outside temperature and wardrobe inventory. In this paper,
we describe an implementation of the proposed system. We show
where a conventional CF approach comes short in terms of the
new user cold-start problem and where it fails to capture the
cooccurrence eect between items. Moreover, we propose a novel
CF approach that mitigates the shortcomings of the conventional
approach and implement the novel approach into the proposed
system. Evaluations using a real-world dataset are performed on
both approaches.
      </p>
      <p>e main contributions of this paper are:
(1) A novel CF approach for recommending daily fashion
outts.
(2) An accuracy evaluation of the approach using dierent
classication algorithms.</p>
      <p>is work is a joint eort between the Smartmedia program1
at NTNU2 and Accenture Norway3. e Smartmedia program is
researching mobile context-aware recommender systems. While, in
this work, Accenture’s main goal is to research modern technology
for building web-based information systems and to keep track of
technology key trends, such as Internet of ings.</p>
      <p>e rest of the paper is structured as follows. In Section 2, we
give an overview of related work, followed by a description of the
proposed system in Section 3. Section 4 introduces the concept
of outt recommendation. e recommendation approaches are
described in Section 5 and Section 6. Evaluation of the approaches
is given in Section 7. We conclude with a summary and discuss
future work in Section 8.
2</p>
    </sec>
    <sec id="sec-3">
      <title>RELATED WORK</title>
      <p>ere are not many systems addressing daily outt
recommendations from either an Internet of ings wardrobe or a virtual
wardrobe. In this section, we give an overview of the state of the
art, identify gaps in these works, and show where our system diers
from past work and how it complements previous work.</p>
      <p>
        Dumeljic et al. propose a virtual wardrobe implemented as a
mobile application [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. By explicitly stating the user’s current
mood, the user can add clothing items that best t the mood, to the
virtual inventory. In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the outt recommendation approach is not
described and has not been implemented in the system. Moreover,
a user study of ten people was conducted, where they concluded
      </p>
      <sec id="sec-3-1">
        <title>1hp://research.idi.ntnu.no/SmartMedia/ 2hp://www.ntnu.edu/ 3hps://www.accenture.com/no-en</title>
        <p>that mood is a motivator for selecting outts, but that users would
be more invested in the system if it also considered weather.</p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], Limaksornkul et al. also propose a mobile application
used as a virtual wardrobe. ey try to solve the problem of
eciently managing closet inventory and guiding users in selecting
clothes based on the user’s fashion style, trends, their friends’ styles,
weather, and occasion. In the mobile application, the users can
manage their clothes, and receive statistical-based, weather-based, and
event-based clothing suggestions. e statistical-based
recommendation engine is preliminary and is the only approach that takes
user’s preferences into account. Moreover, no evaluation of the
system is given.
        </p>
        <p>
          A smart wardrobe system is proposed by Goh et al. in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Here,
garments aached to RFID tags can be scanned in the user’s closet.
Using a system application, the user can get clothing
recommendations based on the user’s mood, preferred color or and occasion.
        </p>
        <p>
          Yu-Chu et al. propose a recommendation system using a
modied Bayesian network for generating outt recommendations from
the user’s clothing items enabled with RFID tags stored in a smart
wardrobe [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. By taking weather, season, and occasion into
consideration, the system rst select a top, and then nds booms which
match the selected top. e process of selecting a boom depend on
user feedback rating the combination. An experiment on 10 users
concluded that the proposed system gave more satised users than
a baseline using a basic Bayesian network without user feedback.
        </p>
        <p>An important aspect that needs to be mentioned is that virtual
wardrobes are heavily dependent on explicit user feedback, while
the Internet of ings wardrobes can make use of implicit user
feedback as well.</p>
        <p>
          As seen in the works above, most of the recommender systems
are preliminary, and does not contain clear steps for the
recommendation algorithm. e ones that do have an implemented
recommender system only have user studies and are lacking accuracy
evaluation of their recommendations. In this paper, we describe a
fully implemented prototype, using similar architecture to [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] and
[
          <xref ref-type="bibr" rid="ref24">24</xref>
          ], enabled with a novel recommendation approach evaluated on
a real-world dataset. To the best of our knowledge, our novel
approach is a completely unique way of generating recommendations
using CF. is is mostly because the majority of CF recommender
systems today, are heavily based on the utility matrix [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], which
is not present in our approach.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>SYSTEM OVERVIEW</title>
      <p>
        In this section, we describe the architecture of the smart wardrobe
proposed in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Moreover, we explain how the users receive
recommendations through the mobile application which is a part
of the architecture. We built and implemented a prototype of the
whole system and created a short demonstration video available at
hps://goo.gl/rZBZqo.
3.1
      </p>
    </sec>
    <sec id="sec-5">
      <title>Architecture</title>
      <p>RFID</p>
      <sec id="sec-5-1">
        <title>Closet</title>
      </sec>
      <sec id="sec-5-2">
        <title>Mobile Application</title>
        <p>with the system. Such clothing items can be manually scanned
through the RFID reader. When a scanning occurs, a message gets
broadcasted to multiple services deployed in the Cloud. ese
services include—among others—a recommender service and an
inventory service. By communicating with each other and a
thirdparty Weather API, they provide outt recommendations to the
Mobile Application.
3.2</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Mobile Application</title>
      <p>When the user opens the mobile application, he gets displayed a
recommendation for an outt that suits today’s temperature and
is inside the user’s closet. By swiping through a list, the user is
displayed multiple recommended outts. Moreover, the user can
modify the recommended outt by using the arrows that
corresponds to each clothing item. By clicking a Save buon, the user
gives an explicit positive feedback on the displayed outt, indicating
that the user has this outt as one of his favorites.</p>
    </sec>
    <sec id="sec-7">
      <title>OUTFIT RECOMMENDATION</title>
      <p>We dene an outt, denoted o, as a tuple of two items, c1 and c2,
where c1 is a top and c2 is a boom. Although clothing outts can
also contain more, or less, than two items, the current version of
our system only addresses outts of two items. is is with the
assumption that most outts comprise of one top and one boom.
Recommendation of outts consisting of a one-piece, e.g., a dress,
or with additional accessories, is planned for later research.
4.1</p>
    </sec>
    <sec id="sec-8">
      <title>Inclusion Criteria</title>
      <p>To ensure that the user receives outt recommendations that are
relevant for a given day, we dene an inclusion criteria for the
clothing items that can be part of a recommended outt. e inclusion
criteria are dened as follows:
(1) Clothing item must be inside the closet. e status of
the item is determined by the latest RFID tag scan.
(2) Clothing item must be suitable for current weather.</p>
      <p>Items are stored in a database with a suitable temperature
range property. is is the range of temperatures a clothing
item is comfortable to wear. e outside temperature at
time of recommendation, must be inside the item’s suitable
temperature range.</p>
      <p>All clothing items that are owned by a user ui and ts the
inclusion criteria is represented as a set I ¹ui º. All outt combinations
that can be generated from I ¹ui º are added to the set O¹ui º.
4.2</p>
    </sec>
    <sec id="sec-9">
      <title>User Ratings</title>
      <p>e favored outts indicated (explicitly or implicitly) by the user,
are stored in the system using unary positive-only values. Outts
that have not been rated are outts that the users either do not like
or have not been seen or used together from the user’s closet C¹ui º.
Not rated outts will be referred to as ’neutral’ outts in the rest of
this paper.
4.3</p>
    </sec>
    <sec id="sec-10">
      <title>Recommended Outts</title>
      <p>e list of recommended outts that the user receives in the mobile
application is generated by the system’s recommender service that
returns the set R¹ui º of recommended outts for the user.
4.4</p>
    </sec>
    <sec id="sec-11">
      <title>Notation</title>
      <p>All the notations dened in this section are summarized in Table 2.
ese notations will be used throughout the paper.</p>
    </sec>
    <sec id="sec-12">
      <title>RETHINKING CONVENTIONAL CF</title>
      <p>In this section, we introduce an approach for outt recommendation
using a conventional utility matrix for collaborative ltering. We
discuss where this approach comes short, and introduce a novel
approach for outt recommendation using an outt-item matrix.
5.1</p>
    </sec>
    <sec id="sec-13">
      <title>Conventional CF Approach</title>
      <p>An obvious solution to recommending fashion outts is to map the
users’ favorite outts onto a utility matrix U , consisting of users
and outts. en, using a neighborhood model, one could predict
new outts for users by comparing the user’s interaction paern
with users with same interaction paern. To recommend the daily
outts R¹ui º, we need to match the predicted outts with the items
that t the inclusion criteria I ¹ui º, and lter out outts that do not
contain only such items. e approach is illustrated in Figure 3.</p>
      <p>
        e rst problem with this approach is that it can only
recommend outts that have been favored by other users. In other words,
it cannot generate completely new outts, and therefore fails to
capture the co-occurrence eect between individual items.
Another problem with this approach is that it is challenged by the
new user cold-start problem. Users who have not favored any
outts or checked out any items, cannot receive recommendations.
Lastly, privacy is becoming a huge concern in recommender
systems [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ], and in this approach, we store all the users’ ratings in
one centralized matrix, causing a huge risk for the users’ privacy.
5.2
      </p>
    </sec>
    <sec id="sec-14">
      <title>Novel Outt-Item Matrix Apprach</title>
      <p>By basing our recommendations on the idea that users that have
similar items in their closets will also have similar taste in outts,
we propose a novel approach where we rethink the conventional
approach by completely transforming the utility matrix. In Figure 4,
we create a matrix Z , where the columns represent outts, and the
rows represent the clothing items that compose the outt. Each
outt is associated with a weight w. is weight is the number
0
un
o1
· · ·
of users who have favored an outt. Using Z and W , we train
a classier using a classication model. Outts that have been
favored by users and have an associated weight above 0 will be
classied as ’positive’, while outts with an associated weight of
0 will be classied as ’neutral’. When the model has been trained,
we generate all the possible outt combinations O¹ui º, of the items
that t the inclusion criteria for the given user ui . By using the
classier, we can now recommend the outts that are classied as
’positive’ to the user R¹ui º.</p>
      <p>e advantages of this approach are that it captures the
cooccurrence interaction eect between two clothing items. is is
because it considers the clothing items that an outt is composed of,
instead of just looking at the outts as a whole. Moreover, it is not
challenged by the new user cold-start problem because we assume
that people that own similar clothing items will have same taste in
outts as well. Lastly, this approach has a huge advantage in terms
of user privacy, because it does not need to store the user-item
combinations in one centralized matrix.</p>
      <p>In Figure 5, we give an example of a possible recommendation
pipeline that can occur in our system using the novel approach. To
the le is the set of all the clothing items owned by the user. By
inpuing this and the current outside temperature at the user’s
location, the function f1 lters out and generates possible outts
for recommendation wrt. the inclusion criteria. ese outts are
then inpued to f2, which follows the same steps as described in
Figure 4. In the end of the pipeline, we get the generated set of
recommended outts that is displayed in the mobile application.</p>
      <p>Although not implemented in our system, this approach could
be easily used by a clothing retailer to generate targeted ads by
inpuing clothing items from the retailer together with the user’s
clothing items in C¹ui º. en, the clothing retailer could
recommend new outts that the users might want to buy, or individual
items that would make a great outt with clothing items already
owned by the user.
0
w1 1
.</p>
      <p>.. CA
wk
Classification model
I(u )
i</p>
      <p>
        Filter
function
25 ℃
f1
o1
o2
f2
o1
o1
In this section, we present the recommendation model for our
novel approach using dierent classication models. e chosen
classication models are widely known and perform well in many
domains [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. e classication models also include a baseline
classier. Moreover, we introduce some neighborhood models that
are applied with the conventional approach.
6.1
      </p>
    </sec>
    <sec id="sec-15">
      <title>Classication Models</title>
      <p>
        Na¨ıve Bayes. Assuming the aributes of the samples are
conditionally independent and given the sample’s class labels, Na¨ıve
Bayes assigns a test sample the class label Y by maximizing the
numerator in this equation [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]:
      </p>
      <p>P ¹Y j X º =</p>
      <p>P ¹Y º Îdi=1 P ¹Xi j Y º</p>
      <p>P ¹X º
;
where X is a set of d aributes.</p>
      <p>
        Adaptive Boosting (AdaBoost). Over the recent years,
classication techniques known as ensemble methods have gained a lot of
aention. One of the most popular ones is AdaBoost. It aggregates
over a set of weak learners ht ¹x º that tends to perform slightly
beer than a random classier. e nal classier H ¹x º is then
obtained by ensembling the weak learners by a weighted majority
voting scheme using this equation [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]:
      </p>
      <p>H ¹x º = sign</p>
      <p>αt ht ¹x º ;
T
Õ
t =1
where αt is the assigned weight for each weak learner.</p>
      <p>To pick the weak learners, each training sample is associated
with a weight indicting its importance. AdaBoost will then pick
its weak learners in a forward stage-wise manner by focusing on
predicting the high-weight samples correctly.</p>
      <p>
        Gradient Boosting. Another popular ensemble method that relies
on a set of weak learners is called Gradient Boosting. It follows
the same fundamental idea as AdaBoost, but instead of focusing on
the sample weights when picking its weak learners, it focuses on
gradients [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>Uniform. As a baseline, we use a classier that generates class
predictions uniformly at random.
6.2</p>
    </sec>
    <sec id="sec-16">
      <title>Neighborhood Models</title>
      <p>
        To predict the ratings of the user-outt combinations in the matrix
U , given in Figure 3, we apply the user-based neighborhood model
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. is model predicts user ratings by nding users that have
rated similar outts. To nd similar users, we can apply dierent
similarity measures. In our model, we apply Jaccard (JAC) and
cosine similarity (COS) as dened by Equation 3:
      </p>
      <p>Sim J AC ¹A; Bº = jA \ B j SimCOS ¹A; Bº = A B (3)
jA [ B j jjAjj jjB jj
Aer user similarities have been calculated we can predict the
ratings rˆui of unrated outts using this formula:
rˆui =
Ív Sim¹u; vºrvi
Ív jSim¹u; vºj
(4)
6.3</p>
    </sec>
    <sec id="sec-17">
      <title>Ranking Model</title>
      <p>To rank the outts that are predicted to the user in R¹ui º, using
the novel approach, we assign each prediction of an outt oj to a
ranking score equal to the classier’s probability of the class label
being ’positive’ P ¹wj &gt; 0 j oj º. It should be noted that this is
not a personalized ranking model, but as seen from our results, it
performed well for each individual user.</p>
      <p>e conventional approach does not use classication models, so
the probability of the predicted class label is not available. Instead,
the outts are ranked according to the predicted rating calculated
using the similarity measures.
(1)
(2)</p>
    </sec>
    <sec id="sec-18">
      <title>EXPERIMENTS</title>
      <p>In this section, we describe the seing for how our experiment
was performed. We give a detailed description of the dataset that
was used and present the results of the dierent models that were
evaluated. e main goals of the experiments are to demonstrate
the eectiveness of the system and to compare and select the best
classication model for our system.
7.1</p>
    </sec>
    <sec id="sec-19">
      <title>Dataset</title>
      <p>e dataset is scraped from Polyvore.com5. Polyvore is a social
media site where users can create clothing outts by matching
individual clothing items. Other users can then ’like’ these outts
by a clicking a ’like buon’.</p>
      <p>From the available outts at Polyvore, we rst gathered the most
liked outts from the last 3 months. For these outts, we ltered
the outts so that they only contained a top and a boom. en,
we collected other outts that these items also were a part of, and
ltered them. Lastly, we gathered all the user likes for each of the
outts we had gathered. Table 3 describes the size of the dataset.</p>
      <p>From the gathered dataset, we have 260 outts that are classied
as ’positive’ and 5,917 that are classied as ’neutral’. is means
that the dataset has an imbalance approximately of 23 to 1.</p>
      <p>In total, there are 158 individual clothing items in the dataset.
is means that the feature vectors used in the classication models
will be relatively sparse binary vectors of 158 dimensions.
7.2</p>
    </sec>
    <sec id="sec-20">
      <title>Evaluation Methods</title>
      <p>To evaluate our novel approach, we iterated through the
following procedure for all users with at least 20 outt likes: For all of
the user’s favorite outts, we hide each of the user’s ground-truth
favorite outts from the system by decreasing the outts’
corresponding weights in W by 1. en, we train the classication model
using Z and W . Moreover, with the assumption that a user only
own items that are part of the items the user likes, we generate
outt combinations, assuming all of the items in C¹ui º ing the
inclusion criteria. We then compared the predicted class labels of
the generated outts combinations to the true favorite outts of
the user. We also ran the procedure a second time, but now by
randomly removing 50% of the users’ tops and booms in C¹ui º. is
was done to simulate outt recommendations from a half empty
closet. In Table 4, we summarize some statistics for the test sets
that was generated by running these methods. As seen in this table,
there are—on average—quite many outts that are being classied
for each user O¹ui º, compared to the true number of the user’s
favorite outts O¹ui ºT P .</p>
      <p>
        To reduce the dimensionality of the samples and to detect items
that are interrelated, the multivariate analysis technique called
principal component analysis was applied to the samples before
training the models [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. e reduction is done by transforming
to a new set of uncorrelated features ordered so that the rst ones
retain most of the original variation.
      </p>
      <p>
        For evaluating the conventional approach using the dierent
neighborhood models, we rst randomly removed 30% of the user
likes from the utility-matrix. en, we predicted all outt likes
for each user, and ltered them out wrt. I ¹ui º using the same
assumption above. e recommended outts were then compared
to the true outt likes.
If we look at the task of recommending the outts as retrieving
all relevant items (outts) from a collection of outts separated
into the two classes; relevant and not relevant, we can apply the
popular accuracy metrics from information retrieval systems. In
our case, we say that the relevant outts are the ones classied as
’positive’, and the not relevant are the outts classied as ’neutral’.
en, we can use a popular metric known as Recall. It measures
the ratio of relevant items retrieved to the number of all relevant
items available [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]:
      </p>
      <p>Recall = jrelevant items retrievedj</p>
      <p>jall relevant itemsj</p>
      <p>In this paper, we also report Recall@N, which is the Recall in
a ranked list just considering the N rst elements. We compute
Recall and Recall@N by averaging over the result for each user ui .</p>
      <p>
        A way to graphically display the tradeo between the true
positive rate and the false positive rate, is known as a receiver operating
characteristic (ROC) curve. e true positive rate is the same as
Recall, and the false positive rate is the ratio of non-relevant items
retrieved to the number of all non-relevant items available. e
ROC curve is great to compare the performance dierence between
classiers, where the best classiers tend to be located in the upper
le corner of the diagram. e classiers that performs best on
average will have a large area under the ROC curve (AUC) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        To evaluate the ranking via utility, we sum the utility of an outt
j to a user u over a ranked recommended list of size L. By summing
over this value for each user, we obtain the R-score as follows [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
m
R-score = Õ
      </p>
      <p>Õ
u=1 j 2Iu;vj L
max fru j ; 0g
2¹vj 1ºα
;
where vj is the rank of outt j and ru j is the ground-truth rating
of outt j. α is the half-life, set to 5 in our experiments. e higher
the R-score is, the true favorite outts for each user tend to appear
in the top of the ranked list.
(5)
(6)</p>
    </sec>
    <sec id="sec-21">
      <title>Results and Discussion</title>
      <p>In this section, we present our results and discuss some insight we
obtained while running the experiments. By the end of this section
we will have answered the following questions:</p>
      <p>Q1. How do the dierent classication models compare using
our novel approach?
Q2. How does closet size aect the recommendation results?
Q3. To what extent can the conventional approach be used to
recommend new outts to the users?
e evaluation method for the novel approach was performed
using the classication models in Section 6.1. For Na¨ıve Bayes the
best conguration was seing a prior probability for the ’neutral’
class label to 0.99 and a 0.01 prior probability for the ’positive’
class. is was mostly due to the 23 to 1 imbalance in the dataset.
AdaBoost gave the best result using decision trees as weak learners
and with a learning rate of 1.0. Gradient Boosting performed best
with similar congurations.</p>
      <p>In Table 5, we report AUC, Accuracy and Recall for the predicted
class labels for all of the outts that were tested when simulating a
full closet. In the right-hand side of the table, we also report the
R-score and Recall@N in a ranked list of L outts. Because each
user has dierent numbers of clothes in their closet, every user is
recommended a ranked list of various lengths of L. e best
performing model in each category is highlighted by underlining its
result. As seen in the table, Gradient Boosting and AdaBoost are the
Naive Bayes
Gradient Boosting
AdaBoost
Uniform
0.8
1.0
dominating models in all categories. On average and overall,
Gradient Boosting performs best, while in a top-L ranked list, AdaBoost
performs slightly beer. For N &gt; 5, Gradient Boosting was—at
maximum—only .006 points beer than AdaBoost in Recall@N. In
terms of the R-score, AdaBoost is superior to Gradient Boosting.
Because of this, we conclude that AdaBoost is the model yielding
highest utility to the users.</p>
      <p>
        In Figure 6, we plot a ROC curve for the dierent models used
to generate a single ranked list of user-outt pairs. is type of
ROC curve is sometimes referred to as a global ROC curve [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. As
indicated by the gray doed line, AdaBoost is the best model at a
false positive rate at 20%, predicting 86% of the users’ favorite outts.
As the false positive rate increase, Gradient Boosting becomes
slightly superior to AdaBoost. On average, Gradient Boosting and
AdaBoost dominates the two other models with an AUC of .864 and
.885, respectively. Na¨ıve Bayes yields a satisfactory AUC of .704,
while from the Uniform model we got an expected AUC of .500.
      </p>
      <p>e high values of AUC and R-score are a strong indication that
the non-personalized ranking model performs quite well and even
beer than expected.</p>
      <p>s
o
itn60
a
d
n
e40
m
m
o
c
e20
R
#0</p>
      <p>Favorite outfits</p>
      <p>Novel outfits</p>
      <p>Figure 7 shows the distributions of outt recommendations in a
top-20 list recommended to the users with at least 20 outt likes.
In total, 196 unique outts were recommended to the users, where
33 of them were novel outts—never favored by any users in the
past. is shows that a wide range of outts end up in the users’
recommended top lists.</p>
      <p>Experiment on a half empty closet resulted in no change in terms
of overall Recall, and at most, a .005 decrease in AUC, and for this
reason, we do not report any results beyond this. Besides the fact
that few clothing items will result in fewer outt recommendations,
we conclude that closet size has lile eect on the
recommendations.</p>
      <p>In Table 6, results from evaluation of the conventional approach
is given. e table shows Recall@N in a ranked list of M outts.
Because M is much lower than L, we only report up to N = 5 (as
1.0
0.8
e
t
a
R0.6
e
v
ii
t
s
o
P
e0.4
u
r
T
0.2
0.0
0.0
0.2
0.4 0.6</p>
      <p>False Positive Rate</p>
      <p>Recall@5
.050
.250
opposed to N = 20 in evaluation of the novel approach). Note that
the results are not comparable to the results in Table 5, as they are
derived using an approach that is fundamentally dierent. e best
performing model is highlighted with underlined results. As the
numbers indicates, the approach generates new outt
recommendations to the users at with a satisfactory accuracy. However, these
outt recommendations are—as argued in Section 5—only outts
that have been composed and favored by other users in the past.
erefore, we conclude that this approach is insucient when it
comes to recommending novel and personalized daily outts.
8</p>
    </sec>
    <sec id="sec-22">
      <title>CONCLUSION AND FUTURE WORK</title>
      <p>We have introduced a novel approach for recommending daily
fashion outts from a smart closet. Our novel approach mitigate
a wide range of challenges faced by a conventional approach that
tries to recommend daily fashion outts. Evaluation of our novel
approach demonstrates the method’s eectiveness, and its ability
to provide users with accurate and novel outt recommendations.</p>
      <p>e results from the evaluation helped us select which model to
deploy in the system. R-score, AUC, and Recall@N are the most
useful measures regarding each individual user. Since, AdaBoost
achieved the highest R-score and AUC, it was chosen as the main
classier and implemented with the novel approach in the
recommender service deployed in the cloud. It should be noted that
Gradient Boosting achieved slightly beer results in Recall@N,
but we regard this dierence as insignicant and conclude that</p>
      <sec id="sec-22-1">
        <title>AdaBoost is indeed the best t for our system.</title>
        <p>A non-comparable evaluation of the conventional approach was
performed to see to what extent it could recommend daily outts.
e accuracy results are acceptable, but due to the approach’s
many challenges, it cannot be considered as an ecient method for
recommending daily outts.</p>
        <p>Although we have demonstrated the system’s performance using
a real-world dataset, a full scale evaluation using data gathered from
physical clothes enabled with RFID tags is planned for future work.
e current state of the system should be considered as an early
prototype and is premature for such a full scale evaluation. Because
of this, these plans are preliminary and we consider other research
topics to be more important at the current stage. ese topics
include content-based outt recommendation and recommendation
of garments to be recycled or donated. With these research
topics, we intend to incorporate additional contextual factors such as
season, user’s occasion, and user’s body type.</p>
        <p>ACKNOWLEDGMENTS
is work is an extension to a prototype of the proposed system
initially developed during an internship at Accenture. e authors
would like to thank everyone involved in the internship for their
contributions prior this work.</p>
        <p>e authors would also like to thank everyone at Accenture who
has provided valuable feedback on this research.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Charu</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Aggarwal</surname>
          </string-name>
          .
          <year>2016</year>
          . Recommender Systems: e Textbook (1st ed.). Springer Publishing Company, Incorporated.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Arnaud</given-names>
            <surname>Berlioz</surname>
          </string-name>
          , Arik Friedman, Mohamed Ali Kaafar, Roksana Boreli, and
          <string-name>
            <given-names>Shlomo</given-names>
            <surname>Berkovsky</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Applying Dierential Privacy to Matrix Factorization</article-title>
          .
          <source>In Proceedings of the 9th ACM Conference on Recommender Systems (RecSys '15)</source>
          . ACM, New York, NY, USA,
          <fpage>107</fpage>
          -
          <lpage>114</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Smriti</given-names>
            <surname>Bhagat</surname>
          </string-name>
          , Udi Weinsberg, Stratis Ioannidis, and Nina Ta.
          <year>2014</year>
          .
          <article-title>Recommending with an Agenda: Active Learning of Private Aributes Using Matrix Factorization</article-title>
          .
          <source>In Proceedings of the 8th ACM Conference on Recommender Systems (RecSys '14)</source>
          . ACM, New York, NY, USA,
          <fpage>65</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Rich</given-names>
            <surname>Caruana</surname>
          </string-name>
          and
          <string-name>
            <given-names>Alexandru</given-names>
            <surname>Niculescu-Mizil</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>An Empirical Comparison of Supervised Learning Algorithms</article-title>
          .
          <source>In Proceedings of the 23rd International Conference on Machine Learning (ICML '06)</source>
          . ACM, New York, NY, USA,
          <fpage>161</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] omas G. Dieerich.
          <year>2000</year>
          .
          <article-title>Ensemble Methods in Machine Learning</article-title>
          .
          <source>In Proceedings of the First International Workshop on Multiple Classier Systems (MCS '00)</source>
          . Springer-Verlag, London, UK, UK,
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Bojana</given-names>
            <surname>Dumeljic</surname>
          </string-name>
          , Martha Larson, and
          <string-name>
            <given-names>Alessandro</given-names>
            <surname>Bozzon</surname>
          </string-name>
          .
          <year>2014</year>
          . Moody Closet:
          <article-title>Exploring Intriguing New Views on Wardrobe Recommendation</article-title>
          .
          <source>In Proceedings of the First International Workshop on Gamication for Information Retrieval (GamifIR '14)</source>
          . ACM, New York, NY, USA,
          <fpage>61</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Yoav</given-names>
            <surname>Freund</surname>
          </string-name>
          and
          <string-name>
            <given-names>Robert E</given-names>
            <surname>Schapire</surname>
          </string-name>
          .
          <year>1997</year>
          .
          <article-title>A Decision-eoretic Generalization of On-Line Learning and an Application to Boosting</article-title>
          .
          <source>J. Comput. Syst. Sci. 55</source>
          ,
          <issue>1</issue>
          (Aug.
          <year>1997</year>
          ),
          <fpage>119</fpage>
          -
          <lpage>139</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Jerome</surname>
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Friedman</surname>
          </string-name>
          .
          <year>2000</year>
          .
          <article-title>Greedy Function Approximation: A Gradient Boosting Machine</article-title>
          .
          <source>Annals of Statistics</source>
          <volume>29</volume>
          (
          <year>2000</year>
          ),
          <fpage>1189</fpage>
          -
          <lpage>1232</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>K. N.</given-names>
            <surname>Goh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. S.</given-names>
            <surname>Lin</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Developing a smart wardrobe system</article-title>
          .
          <source>In 2011 IEEE Consumer Communications and Networking Conference (CCNC)</source>
          .
          <volume>303</volume>
          -
          <fpage>307</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Derek</surname>
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Hansen</surname>
            and
            <given-names>Jennifer</given-names>
          </string-name>
          <string-name>
            <surname>Golbeck</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <article-title>Mixing It Up: Recommending Collections of Items</article-title>
          .
          <source>In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '09)</source>
          . ACM, New York, NY, USA,
          <fpage>1217</fpage>
          -
          <lpage>1226</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Jonathan</surname>
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Herlocker</surname>
          </string-name>
          , Joseph A.
          <string-name>
            <surname>Konstan</surname>
          </string-name>
          , Loren G. Terveen, and John T. Riedl.
          <year>2004</year>
          .
          <article-title>Evaluating Collaborative Filtering Recommender Systems</article-title>
          .
          <source>ACM Trans. Inf. Syst</source>
          .
          <volume>22</volume>
          ,
          <issue>1</issue>
          (Jan.
          <year>2004</year>
          ),
          <fpage>5</fpage>
          -
          <lpage>53</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Kurt</surname>
            <given-names>Jacobson</given-names>
          </string-name>
          , Vidhya Murali, Edward Newe,
          <string-name>
            <given-names>Brian</given-names>
            <surname>Whitman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Romain</given-names>
            <surname>Yon</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Music Personalization at Spotify</article-title>
          .
          <source>In Proceedings of the 10th ACM Conference on Recommender Systems (RecSys '16)</source>
          . ACM, New York, NY, USA,
          <fpage>373</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Dietmar</surname>
            <given-names>Jannach</given-names>
          </string-name>
          , Lukas Lerche, and
          <string-name>
            <given-names>Iman</given-names>
            <surname>Kamehkhosh</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Beyond ”Hiing the Hits”: Generating Coherent Music Playlist Continuations with the Right Tracks</article-title>
          .
          <source>In Proceedings of the 9th ACM Conference on Recommender Systems (RecSys '15)</source>
          . ACM, New York, NY, USA,
          <fpage>187</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Ian</surname>
            <given-names>Jollie.</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Principal component analysis</article-title>
          .
          <source>Wiley Online Library.</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Ingunn</given-names>
            <surname>Grimstad</surname>
          </string-name>
          Klepp and
          <string-name>
            <given-names>Kirsi</given-names>
            <surname>Laitala</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Clothing consumption in Norway</article-title>
          .
          <source>Technical report 2</source>
          . Oslo and Akershus University College, Oslo. In Norwegian.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Anders</given-names>
            <surname>Kolstad</surname>
          </string-name>
          ,
          <string-name>
            <surname>O¨</surname>
          </string-name>
          <article-title>zlem O¨zgo¨bek, Jon Atle Gulla, and</article-title>
          <string-name>
            <given-names>Simon</given-names>
            <surname>Litlehamar</surname>
          </string-name>
          .
          <year>2017</year>
          .
          <article-title>Connected Closet - A Semantically Enriched Mobile Recommender System for Smart Closets</article-title>
          .
          <source>In Proceedings of the 13th International Conference on Web Information Systems and Technologies (WEBIST</source>
          <year>2017</year>
          ).
          <fpage>298</fpage>
          -
          <lpage>305</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Jure</surname>
            <given-names>Leskovec</given-names>
          </string-name>
          , Anand Rajaraman, and Jerey David Ullman.
          <year>2014</year>
          .
          <article-title>Mining of Massive Datasets (2nd ed</article-title>
          .). Cambridge University Press, New York, NY, USA.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>David</surname>
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Lewis</surname>
          </string-name>
          .
          <year>1998</year>
          .
          <article-title>Naive (Bayes) at Forty: e Independence Assumption in Information Retrieval</article-title>
          .
          <source>In Proceedings of the 10th European Conference on Machine Learning (ECML '98)</source>
          . Springer-Verlag, London, UK, UK,
          <fpage>4</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Chantima</surname>
            <given-names>Limaksornkul</given-names>
          </string-name>
          , Duangkamol Na Nakorn,
          <string-name>
            <given-names>Onidta</given-names>
            <surname>Rakmanee</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Wantanee</given-names>
            <surname>Viriyasitavat</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Smart Closet: Statistical-based apparel recommendation system</article-title>
          .
          <source>In Student Project Conference (ICT-ISPC)</source>
          ,
          <year>2014</year>
          ird ICT International. IEEE,
          <fpage>155</fpage>
          -
          <lpage>158</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>John</surname>
            <given-names>C Pruit.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Geing Dressed. Popular Culture as Everyday Life (</article-title>
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Andrew</surname>
            <given-names>I. Schein</given-names>
          </string-name>
          , Alexandrin Popescul,
          <string-name>
            <surname>Lyle H. Ungar</surname>
            , and
            <given-names>David M.</given-names>
          </string-name>
          <string-name>
            <surname>Pennock</surname>
          </string-name>
          .
          <year>2002</year>
          .
          <article-title>Methods and Metrics for Cold-start Recommendations</article-title>
          .
          <source>In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '02)</source>
          . ACM, New York, NY, USA,
          <fpage>253</fpage>
          -
          <lpage>260</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Xiaoyuan</given-names>
            <surname>Su and Taghi M. Khoshgo</surname>
          </string-name>
          aar.
          <year>2009</year>
          .
          <article-title>A Survey of Collaborative Filtering Techniques</article-title>
          .
          <source>Adv. in Artif. Intell. 2009, Article</source>
          <volume>4</volume>
          (
          <issue>Jan</issue>
          .
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Andreu</given-names>
            <surname>Vall</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Listener-Inspired Automated Music Playlist Generation</article-title>
          .
          <source>In Proceedings of the 9th ACM Conference on Recommender Systems (RecSys '15)</source>
          . ACM, New York, NY, USA,
          <fpage>387</fpage>
          -
          <lpage>390</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Lin</given-names>
            <surname>Yu-Chu</surname>
          </string-name>
          , Yuusuke Kawakita, Etsuko Suzuki, and
          <string-name>
            <given-names>Haruhisa</given-names>
            <surname>Ichikawa</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Personalized Clothing-Recommendation System Based on a Modied Bayesian Network</article-title>
          .
          <source>In Proceedings of the 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT '12)</source>
          . IEEE Computer Society, Washington, DC, USA,
          <fpage>414</fpage>
          -
          <lpage>417</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>