<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Method of User Preference Elicitation by Pairwise Comparisons</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander Borodinov</string-name>
          <email>aaborodinov@yandex.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladislav Myasnikov</string-name>
          <email>vmyas@geosamara.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Geoinformatics and Information Security Department, Samara National Research University</institution>
          ,
          <addr-line>Samara</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <fpage>50</fpage>
      <lpage>53</lpage>
      <abstract>
        <p>-In this paper, we consider the problem of reconstructing functions defined implicitly by the results of pairwise comparisons. In the proposed approach, we apply an adaptive transformation to the high-dimensional space. Then we classify the comparisons using linear or non-linear classifiers. In this work, we consider linear regression and random forest as classification algorithms. In experimental analysis, we compare different methods of transformation to the high-dimensional space and investigate the effectiveness of the proposed method.</p>
      </abstract>
      <kwd-group>
        <kwd>utility preferences elicitation</kwd>
        <kwd>learning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>function,
pairwise
preference
comparisons,
function,
machine</p>
    </sec>
    <sec id="sec-2">
      <title>I. INTRODUCTION</title>
      <p>
        The method of pairwise comparisons is one of the methods
used in recommendation systems. Analyzing pairwise
comparisons, we try to determine some pattern in the choice of
the preferred option. The method of pairwise comparisons uses
information about comparing pairs of objects, in contrast to the
classical methods of machine learning, which use data about a
specific object [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. The task of providing recommendations
for a particular user is the task of preference elicitation.
      </p>
      <p>
        Three main types of tasks are specified according to
different types of objects and classes [
        <xref ref-type="bibr" rid="ref3 ref5">3,5</xref>
        ]:
      </p>
      <p>- label ranking – search for preferred ordering among labels
for any example. The traditional classification problem can be
generalized as part of the label ranking problem when the
classification result of the example is a label of the highest
rank;</p>
      <p>- instance ranking – ranking a set of examples for a fixed
label order;</p>
      <p>- object ranking – similar to ranking examples, however,
labels are not associated with examples.</p>
      <p>
        In this paper, we consider the task of ranking objects where
the objects may be the transport routes proposed by the
recommender system [
        <xref ref-type="bibr" rid="ref6 ref7">6,7</xref>
        ], and the preferences are the routes
selected by the user. In the second section of the paper, we
briefly describe the existing approaches to the construction of
recommender systems. In the third section, we give the
problem formulation and problem statement. The fourth
section describes the method of pairwise comparisons. The
fifth section shows the results of experimental studies. At the
end of the work, conclusions and possible directions for further
research are presented.
 j
and  j  i . In the case  i   j   j   i , the objects are
indistinguishable and   ≪   . Absolute preference is
characterized by utility function u :   R , and relative
preference is described by preference function p :     R .
For utility function u  i   u  j  denote as  i
 j ,
u  i   u  j    i   j
      </p>
      <p>and  (  ) =  (  ) ⇔   ≪   .</p>
      <p>For preference function p  i , j   0 denote as  i
 j and
 (  ,   ) = 0 ⇔   ≪   . The preference function has
restrictions based on the properties of the corresponding order
relations such as asymmetry in argument, transitivity, etc.</p>
      <p>A preference function can be defined through a utility
function
p  j , i   u  j   u  i 
and
u  j   p  j , *   u  *   p  * , *   0  .</p>
      <p>Objects are defined by the feature vector x  x    X of
N-dimensional space. The utility and preference function will
be
written
as
p  x , x j  , u  x  .</p>
      <p>Let x j  x  j 
and
p ij  p  i , j  , u j  u  j 
to
shorten
the
record.</p>
      <p>Information about pairwise comparisons can be presented in
the form of values of the preference function p  j ,  i  or in
the form of a symbolic representation:
 1,


z ij  z  j ,  i    0 ,

  1,

p  j ,  i   0 ,
p  j ,  i   0 , .
p  j ,  i   0 .</p>
      <p>The choice of a specific route from the route list proposed
by the system is an example of information on paired
comparisons in a transport recommendation system.</p>
      <p>The number of incorrectly reconstructed relationships, the
Kendall distance for pairwise comparisons, is a criterion for the
reconstruction quality of the preference and utility function:
d   (i , j ) : z  i , j   z  x  i  , x  j   , (i , j )  I  ,
This value in the normalized form is an estimate of the
corresponding relation errors probability d  d  I 1 .</p>
    </sec>
    <sec id="sec-3">
      <title>IV. METHOD</title>
      <sec id="sec-3-1">
        <title>A. Pairwise Comparison Method</title>
        <p>
          Pair comparison methods were initially used to range
objects that cannot be described by a feature vector. Each
element of the matrix  c ij  is the absolute frequency of the i-th
object over j-th [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. To analyze such data, the Thurstone
model was proposed [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], in which it is assumed that the utility
of an object is determined by a normally distributed random
variable. Thus, for objects  0 , 1 we get
f u  u  j 
   j , 2j 
,
which
with
u  1   u  0 
        </p>
        <p>   1   0 , 120  ,  120   12   02  2  10 1  0
and the Laplace function  </p>
        <p> we get:
P  1
 0   P  u  1   u  0   0      1   0  .
  10 </p>
        <p>In the numerical estimation of the probability (5) as the
relative frequency of the corresponding preferences calculated
using the matrix  c ij  , we have the following estimation:
 1   0 ˆ  10   1  с10  .</p>
        <p> с10  с 01 </p>
        <p>The simplified Thurstone model assumes the absence of
correlation and equal variances in the utility function, which
can be represented as:  12   02  0 .5 ,  10  0 ,  120  1 .</p>
        <p>
          Another featureless method is the Bradley-Terry model.
[
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Estimating the probability (5) in the following form:
 1
 1   0
P  1
 0  
,  j  e x p   j s  ,
where s is a numerical non-negative parameter. Thus, we have
the following estimate of the preferences between the objects:
 1   0 ˆ s  ln  с10 с10 с 01   ln  1 
с10   .
        </p>
        <p>
с10  с 01  </p>
        <p>The analytic hierarchy process (AHP) is used for the
multicriteria ranking of objects that are defined by features. In
this case, at the initial step matrices  m inj  i , j J , n  0 , N  1
are calculated. Each element of the matrix is the result of a user
response regarding the preferences of the i-th object over the
jth objects according to the n-th criterion. The resulting utility
N 1
of the objects as a scalar product u  j    w n v nj , where
n  0
v n   v 0n ,</p>
        <p>T
, v nJ 1  is the right eigenvector of the preference
matrix, and w – eigenvector of the matrix of alternatives. The
main problem of this method is a large number of pairwise
comparisons. Therefore, in practice, they often use a model</p>
        <p>N 1
u  x      w n  v n  x n    , based on a generalized additive
n  0
model.</p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Proposed method description</title>
        <p>The following features should be considered
reconstructing the utility function and preference function:
when
- reconstruction of functions is practically impossible with
a small amount of information or in its absence, as in the case
of a system cold start;</p>
        <p>- it must be able to automatically transform to nonlinear
models. Classes will be separable almost surely when using
transformation the original features space to a new feature
space Y with a higher dimension;</p>
        <p>- the regression task of reconstructing the utility function
can be reduced to the classification problem by reconstructing
the symbolic representation.</p>
        <p>
          The method of function reconstruction by their symbolic
representation contains the following steps:
– feature values normalization in the range [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ];
– selection of a new feature space (basis) Y;
– transformation of the original feature vector x into the
new feature space Y with a higher dimension K=dim(Y)  N;
– building a linear or nonlinear classifier in the feature
space Y;
        </p>
        <p>– quality assessment of the building classifier on the test
dataset.</p>
        <p>In the case when the evaluation of the preference function
is unsatisfactory, go to the selection of a new basis and
transformation of the feature space.</p>
        <p>The described steps are presented as a diagram in Fig. 1.</p>
        <p>KS
synthesis
model dimension</p>
        <p>Classifier parameters for a particular training set  x j , r j  j J
are determined from the condition:</p>
        <p>J  w    ln 1  e x p   r j  d  x j     m in ,</p>
        <p>j J
where r j    1,1 – is a random variable of the correct
classification that determines the true class of the
corresponding j-th object.</p>
        <p>A random forest is a voting method implementation of
several tree classifiers. A random forest avoids retraining,
unlike a decision tree. Each tree is built independently of the
rest on a random subset of the training set. The components of
the feature vector are selected from a random subset of features
for each partition when learning trees.</p>
        <p>User decisions may be erroneous, especially with a small
difference in the proposed alternatives. Therefore, in this work
we use the Thurstone’s model with the probability estimation
to add errors in the ideal preferences. For the case  j   i :
 z  j ,  i  ,
z ij  
  z  j ,  i  , o th e r w is e .
</p>
        <p>
          r n d  P  u  j   u  i   0  ,
where rnd &lt;R[
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ] - random variable.
        </p>
        <p>We train and test the model several times, averaging the
results of the error calculation, in order to avoid the effect of
unsuccessful partitioning of the set on the training and test
datasets.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>V. EXPERIMENTAL RESEARCH</title>
      <p>We used the following parameters during the experiments:
– The synthesis model dimension Ks = 15, 35;
– The transformation model dimension Ka = 15, 35, 63;
– The paired comparisons number InstNum
50000;
= 10000,</p>
      <p>– The number of random partitions of the dataset nIter =
100.</p>
      <p>Comparison of the effectiveness of various bases is
presented in Table I.</p>
      <p>An increase in the number of pairwise comparisons led to a
decrease in the error value, however, it significantly increased
the program execution time, especially for the random forest
method. We can state, based on the results, that the proposed
approach has demonstrated efficiency and effectiveness.</p>
    </sec>
    <sec id="sec-5">
      <title>VI. CONCLUSION</title>
      <p>The paper proposes an approach to the reconstruction of
functions defined implicitly by the results of pairwise
comparisons. The approach is based on the transformation into
the symbolic space of a greater dimension with the subsequent
classification of the comparison results. It is shown that the
proposed method allows us to effectively solve the problem of
evaluating the user preference function. Logistic regression has
a significant advantage in speed and stability. A further area of
research is the application of the developed approach on data
on preferred routes for users on public and private transport.</p>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGMENT The work was funded by the Ministry of Science and Higher Education of the Russian Federation (unique project identifier RFMEFI57518X0177).</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.A.</given-names>
            <surname>Bradley</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.E.</given-names>
            <surname>Terry</surname>
          </string-name>
          , “
          <source>Rank Analysis of Incomplete Block Designs: I. The Method of Paired Comparisons,” Biometrika</source>
          , vol.
          <volume>39</volume>
          , no.
          <issue>3</issue>
          /4, pp.
          <fpage>324</fpage>
          -
          <lpage>345</lpage>
          ,
          <year>1952</year>
          . DOI:
          <volume>10</volume>
          .2307/2334029.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.C.</given-names>
            <surname>Fishburn</surname>
          </string-name>
          , “
          <article-title>Utility theory for decision making,”</article-title>
          <string-name>
            <surname>Huntington</surname>
            ,
            <given-names>N.Y: R.E. Krieger</given-names>
          </string-name>
          <string-name>
            <surname>Pub</surname>
          </string-name>
          . Co,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fürnkranz</surname>
          </string-name>
          and E. Hüllermeier, “Preference Learning,” Berlin Heidelberg: Springer-Verlag,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.P.</given-names>
            <surname>Murphy</surname>
          </string-name>
          , “
          <article-title>Machine Learning: A Probabilistic Perspective</article-title>
          ,” Cambridge, MA: The MIT Press,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Myasnikov</surname>
          </string-name>
          , “
          <article-title>Reconstruction of functions and digital images using sign representations,” Computer Optics</article-title>
          , vol.
          <volume>43</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>1041</fpage>
          -
          <lpage>1052</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .18287/
          <fpage>2412</fpage>
          -6179-2019-43-6-
          <fpage>1041</fpage>
          -1052.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Agafonov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.S.</given-names>
            <surname>Yumaganov</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Myasnikov</surname>
          </string-name>
          , “
          <article-title>Big data analysis in a geoinformatic problem of short-term traffic flow forecasting based on a K nearest neighbors</article-title>
          method,”
          <source>Computer Optics</source>
          , vol.
          <volume>42</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>1101</fpage>
          -
          <lpage>1111</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .18287/
          <fpage>2412</fpage>
          -6179-2018- 42-6-
          <fpage>1101</fpage>
          -1111.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Agafonov</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Myasnikov</surname>
          </string-name>
          , “
          <article-title>Numerical route reservation method in the geoinformatic task of autonomous vehicle routing</article-title>
          ,”
          <source>Computer Optics</source>
          , vol.
          <volume>42</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>912</fpage>
          -
          <lpage>920</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .18287/
          <fpage>2412</fpage>
          -6179-2018-42-5-
          <fpage>912</fpage>
          -920.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bell</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Volinsky</surname>
          </string-name>
          , “
          <article-title>Matrix Factorization Techniques for Recommender Systems</article-title>
          ,” Computer, vol.
          <volume>42</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>30</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>2009</year>
          . DOI:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MC</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <volume>263</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Qin</surname>
          </string-name>
          , T.-Y. Liu,
          <string-name>
            <given-names>M.-F.</given-names>
            <surname>Tsai</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>Learning to rank: From pairwise approach to listwise approach</article-title>
          ,” ACM International Conference Proceeding Series, vol.
          <volume>227</volume>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>136</lpage>
          ,
          <year>2007</year>
          . DOI:
          <volume>10</volume>
          .1145/1273496.1273513.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Joachims</surname>
          </string-name>
          , “
          <article-title>Optimizing search engines using clickthrough data</article-title>
          ,
          <source>” Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>
          , pp.
          <fpage>133</fpage>
          -
          <lpage>142</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          , “
          <article-title>Practical lessons from predicting clicks on ads at Facebook,”</article-title>
          <source>Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>
          ,
          <year>2014</year>
          . DOI:
          <volume>10</volume>
          .1145/2648584.2648589.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Covington</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Adams</surname>
          </string-name>
          and E. Sargin, “
          <article-title>Deep neural networks for youtube recommendations</article-title>
          ,
          <source>” RecSys - Proceedings of the 10th ACM Conference on Recommender Systems</source>
          , pp.
          <fpage>191</fpage>
          -
          <lpage>198</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1145/2959100.2959190.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Campigotto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Rudloff</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Leodolter</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Bauer</surname>
          </string-name>
          , “Personalized and
          <string-name>
            <surname>Situation-Aware Multimodal</surname>
          </string-name>
          Route Recommendations:
          <source>The FAVOUR Algorithm,” IEEE Transactions on Intelligent Transportation Systems</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>102</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1109/TITS.
          <year>2016</year>
          .
          <volume>2565643</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>K.</given-names>
            <surname>Tsukida</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Gupta</surname>
          </string-name>
          , “How to Analyze Paired Comparison Data,”
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.L.</given-names>
            <surname>Thurstone</surname>
          </string-name>
          , “
          <article-title>A law of comparative judgment,” Psychological Review</article-title>
          , vol.
          <volume>34</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>273</fpage>
          -
          <lpage>286</lpage>
          ,
          <year>1927</year>
          . DOI:
          <volume>10</volume>
          .1037/h0070288.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>