Keywords

1 Introduction

With the strong development of network transactions and e-commerce logistics industry, the information and data of users of network transactions of e-commerce logistics are expanding, along with the expanding information field of e-commerce logistics and the expanding information space, how to extract the information that users care from the massive information and improve the evaluation performance of merchants has become a research topic of concern [1]. The problem of accurate and effective evaluation algorithms for trust in online transactions is studied. In the open and complex network environment, factors such as randomness and ambiguity in the transaction process through the network are unpredictable, and the traditional evaluation mechanism does not make accurate judgment and quantitative assessment of them. In an open and complex network environment, buyers and sellers choose each other through a virtual network platform. For example, in Taobao, where the number of online transactions is powerful, buyers choose whether a merchant can fulfill their promises based on their needs and the reputation of similar merchants. Likewise, sellers evaluate buyers who have chosen their goods based on their trustworthiness. It is necessary to control and evaluate the trust degree of each other, and to improve the quantitative assessment performance of merchants by designing a logistic trust degree progressive control model for e-commerce and conducting trust degree ratings of online physical objects [2].

Traditional models have solved the trust assessment methods and evaluation degree calculation of buyers and sellers in online transactions to varying degrees under certain application conditions, but with the popularity of the Internet, the increase in online users, and the increase in user satisfaction, many shortcomings have emerged in the specific application of these models [3]. For example, in the open and complex online environment, the randomness of the communication between buyers and sellers in the process of purchasing products and the unpredictability of whether the transaction between merchants and buyers can be carried out smoothly are uncertainties that cannot be accurately predicted when using the knowledge of probability theory for estimation, and if there are malicious buyers or sellers who deliberately break the trust degree by making false evaluations, the evaluation mechanism cannot If there are malicious buyers or sellers who deliberately break the trust, the evaluation mechanism cannot make a definite judgment and eliminate them. At the same time, the above model does not give different trust degree evaluation mechanisms according to the different characteristics of entities, and lacks some flexibility [4, 5]. It can be seen that the traditional e-logistics trust degree control model adopts the model design method of autocorrelation function analysis, and the evaluation effect is not good due to the large subjectivity of autocorrelation feature analysis [6,7,8]. In response to the above problems, this paper proposes a progressive control model of trust degree of e-logistics based on inter-correlation criterion. Firstly, the resource database structure model of e-logistics is constructed, and based on the mutual correlation criterion, the e-logistics user recommendation model construction and network trust degree control model are carried out to realize the algorithm improvement, and the simulation experiment is carried out to demonstrate its superior performance by performance test.

2 Resource Database Structure Model and Trust Influence Parameters for E-logistics

2.1 Resource Database Structure Model for E-logistics

Design the resource database structure model of e-logistics based on cloud computing, and set the query history of e-logistics resource database users as \(W = \{ w_{1} , \ldots ,w_{p} \}\).The query pattern \(\sigma (W)\) is a two-dimensional matrix of \(p \times p\). For \(1 \le i,j \le p\), the cascade layer depth is \(N_{k} (k = 0,1,...,L)\), denotes the number of k-layer data connections data target position location state estimation vector is

$$ \alpha = (\alpha_{1} ,\alpha_{2} , \ldots ,\alpha_{n} ) \ne 0 $$
(1)

Denote by \(W_{ij}^{(k)}\), the connection weight of the jth layer of k, \(x_{i}^{(k)}\) is the \(i\) \((i = 1,2,...,N_{k} )\) input vector of the hidden data set in the e-logistics database. Denote the linear input and reversible invariant output of the e-logistics trustworthiness evaluation system by \(s_{j}^{(k)}\) and \(y_{j}^{(k)}\), Expressed as an eigenvector as:

$$ x^{k} = \left[ {x_{1}^{\left( k \right)} ,x_{2}^{\left( k \right)} , \ldots x_{{N_{k - 1} }}^{\left( k \right)} } \right]^{T} $$
(2)
$$ s^{\left( k \right)} = \left[ {s_{1}^{\left( k \right)} ,s_{2}^{\left( k \right)} , \ldots s_{{N_{k} }}^{\left( k \right)} } \right]^{T} $$
(3)
$$ y^{\left( k \right)} = \left[ {y_{1}^{\left( k \right)} ,y_{2}^{\left( k \right)} ,y_{{N_{k} }}^{\left( k \right)} } \right]^{T} $$
(4)

The power spectrum optimized allocation probability density function of the resource database obtained by grid assignment (Pr):

$$ \left| {\Pr \left( {{\text{Re}} al_{\sum ,A} \left( k \right) = 1} \right) - \Pr \left( {Simulator_{\sum ,A,Sim} \left( k \right) = 1} \right)} \right| \le negl\left( k \right) $$
(5)

In e-commerce transactions, if both parties agree, the transaction can be carried out smoothly, and the buyer evaluates the seller according to the merchant’s various service attitudes, and the evaluation can be converted into the merchant’s reputation to facilitate the smooth conduct of the next transaction. The above process shows that only the mutual trust mechanism between buyers and sellers can ensure the smooth transaction in the virtual network environment. The above process realizes the construction of the resource database structure model of e-logistics and lays the foundation for the progressive control of trust degree.

2.2 E-logistics Trust Influence Parameters and Cloud Preprocessing

The main parameters influencing the trust in e-logistics are: the credibility of the evaluator, the historical evaluation value accumulated by the merchant, and the price of the transacting entity. Due to the unpredictability factors such as randomness and ambiguity of the buyer and seller in conducting the transaction process, and also if there is a deliberate breaking of trust by the user, the existing evaluation mechanism does not make an exact judgment on it. Trust between subjects includes both direct trust and indirect trust. Direct trust is obtained by the subject based on his own experience, assuming the existence of n evaluations of the evaluated goods, corresponding to m characteristic attributes. If each evaluation is considered as a cloud factor, then m trust attribute clouds are obtained using the trust attribute inverse growth cloud algorithm. The data set contains n samples for n uncorrelated independent vectors, let the range e-logistics data value domain for N discrete points \(A = \left\{ {a_{1} , \ldots ,a_{N} } \right\}\), and meet \(a_{1} < a_{2} < \ldots < a_{N}\).The set \(X\) is divided into class c and the set of subscripts is assigned:

  1. 1)

    \(V_{1} = \left\{ { > a_{1} , > a_{2} , \ldots , > a_{N - 1} } \right\}\)

  2. 2)

    \(V_{2} = \left\{ { \ge a_{1} , \ge a_{2} , \ldots , \ge a_{N} } \right\}\)

  3. 3)

    \(V_{3} = \left\{ { < a_{1} , < a_{2} , \ldots , < a_{N} } \right\}\)

  4. 4)

    \(V_{4} = \left\{ { \le a_{1} , \le a_{2} , \ldots , \le a_{N} } \right\}\)

  5. 5)

    \(V_{5} = \left\{ { = a_{1} , = a_{2} , \ldots , = a_{N} } \right\}\)

Suppose U is a quantitative domain and C is a qualitative concept in U. When the quantitative value x is a random realization in the qualitative concept C and the degree of certainty \(\mu \left( {\text{x}} \right) \in \left[ {0,1} \right]\) of x with respect to C is a stable random number, then the distribution of x over the quantitative domain U is called a cloud, denoted as \(C(X)\). Each x is called a cloud droplet. Where the cloud droplet is described quantitatively by a standard normal function. The cloud model is described by a large number of quantitative values with certainty for qualitative quantities, and it mainly utilizes forward and inverse cloud generators for interconversion of qualitative and quantitative concepts. Suppose that U is a topological quantitative domain of trust data of God’s network and C is a qualitative concept in U. When the quantitative value x is a random realization of the qualitative concept C in, The determinacy of x with respect to C, \(\mu \left( {\text{x}} \right) \in \left[ {0,1} \right]\) is a stable random number. Through the above processing, the correlation analysis and cloud pre-processing of the parameters influencing the trust degree of e-logistics are realized to provide an accurate data base for conducting the trust degree of e-logistics.

3 Improvement of Trust Degree Asymptotic Control Model Based on Mutual Correlation Criterion

On the basis of the above model design, algorithm improvement is carried out, and the superior traditional e-logistics trust degree control model adopts the model design method of autocorrelation function analysis, which is more subjective in autocorrelation feature analysis and has poor evaluation effect. In this regard, this paper proposes a progressive control model of trust degree of e-logistics based on the inter-correlation criterion.

The DOI (Degree of Interest) intercorrelation criterion is used to describe the user’s trust evaluation of the resource, and the posterior probability of successful negotiation between two subjects for the n + 1th time follows a Beta distribution.

$$ P_{a + 1} = E(Beta(P |a + 1,n - a + 1)) = \frac{a + 1}{{n + 2}} $$
(6)

Let the mutual correlation function weight function be U, where \(\sum {u = 1}\). The trust relationship model between e-logistics user A and user B, where \(I_{a}\) is the resource identifier of user A. The following must be satisfied by network users for e-logistics A products:

$$ v - p_{1} + \rho_{1} A_{1} \ge 0 $$
(7)
$$ v - p_{1} + \rho_{1} A_{1} \ge \delta \cdot v - p_{2} + \rho_{2} A_{2} $$
(8)
$$ U = \left\{ {\begin{array}{*{20}l} {v \ge p_{1} - \rho_{1} A_{1} } \\ {v \ge \frac{{p_{1} - p_{2} + \rho_{2} A_{2} - \rho_{1} A_{1} }}{1 - \delta }} \\ \end{array} } \right. $$
(9)

Based on the mutuality criterion, a consumer who chooses logistics product B must satisfy:

$$ \delta \cdot v - p_{2} + \rho_{{2}} A_{2} \ge 0 $$
(10)

The above equation tabulates the rating of resource i by users A, B in the user trust network control system. The indirect trust relationship between users is obtained denoted as \(A \to B\), \(B \to C\). Launching:

$$ MSD_{a \to b} = 1 - \frac{{\sum\limits_{i = 1}^{{\left| {I_{a,b} } \right|}} {\sqrt {(d_{a,i} - \overline{d}_{a} )^{2} + (d_{b,i} - \overline{d}_{b} )^{2} } } }}{{\left| {I_{a,b} } \right| \times \sum\limits_{i = 1}^{{\left| {I_{a,b} } \right|}} {\left[ {\sqrt {(d_{a,i} - \overline{d}_{a} )^{2} } + \sqrt {(d_{b,i} - \overline{d}_{b} )^{2} } } \right]} }} $$
(11)

The randomness of buyers in the process of shop** for goods and communication with sellers, merchants and buyers to conduct transactions between them meet the following constraints:

$$ v - p_{1} + \rho_{{1}} A_{1} < \delta \cdot v - p_{2} + \rho_{{2}} A_{2} $$
(12)

That is:

$$ U = \left\{ {\begin{array}{*{20}l} {v \ge \frac{{p_{2} - \rho_{{2}} A_{2} }}{\delta }} \hfill \\ {v < \frac{{p_{1} - p_{2} + \rho_{{2}} A_{2} - \rho_{{1}} A_{1} }}{1 - \delta }} \hfill \\ \end{array} } \right. $$
(13)

Users trust the rating of resource i by users A, B in the network control system, and if there are malicious buyers or sellers who make false ratings to deliberately break the trust level, there are:

$$ p_{2} - \rho_{2} A_{2} \ge \delta \cdot (p_{1} - \rho_{1} A_{1} ) $$
(14)

At this point, the market only has demand for product A; when the following inequality is satisfied:

$$ p_{2} - \rho_{2} A_{2} \le p_{1} - \rho_{1} A_{1} - Q({1} - \delta ) $$
(15)

In the above equation, \({\varvec{w}}{(}k{)} \in \mathop {R{\kern 1pt} }\nolimits^{n}\) the expert rating results in an unknown perturbation in the finite energy local range. When:

$$ \delta \cdot (p_{1} - \rho_{1} A_{1} ) \le p_{2} - \rho_{2} A_{2} \le p_{1} - \rho_{1} A_{1} - Q({1} - \delta ) $$
(16)

The asymptotic coefficients of user trust evaluation \(\gamma > 0\), if there exist positive definite symmetric matrices \(Q\), \(S\), \(M\), the asymptotic control solutions of e-logistics trust degree are:

$$ \frac{{p_{1} - p_{2} + \rho_{{2}} A_{2} - \rho_{{1}} A_{1} }}{1 - \delta } \le v \le Q $$
(17)
$$ \frac{{p_{2} - \rho_{{2}} A_{2} }}{\delta } \le v \le \frac{{p_{1} - p_{2} + \rho_{{2}} A_{2} - \rho_{{1}} A_{1} }}{1 - \delta } $$
(18)

In the above equation, \(Trust_{a \to b}\) represents the trust weight value of target user A to user neighbor B. The use of using \(TW\) to increase the number of similar users in the traditional collaborative filtering recommendation method produces an uncertain time lag due to the high number of similar users in the trust network model, At this time, two users jointly make a normalized evaluation of each other’s trust value model and construct a user trust assessment mechanism and network control model. This realizes the progressive control of e-logistics trust based on the mutual correlation criterion and improves the management and control benefits for e-logistics merchants.

4 Simulation Experiments and Results Analysis

In order to test the performance of the algorithm in this paper in achieving the progressive control of trust in e-logistics, simulation experiments are conducted. Experimental environment: Myeclipse 8.0 experimental simulation platform and Java platform development language and combined with swarm program package. According to the analysis, the e-logistics network trading merchants receive customer orders, through the multi-subject negotiation, the subject respectively in accordance with their role in the merchant and the sector in which they are synergistically play their role, together to serve the business objectives. The trust level of network information is modeled according to the index system described in the previous section and divided into five levels, A, B, C, D and E. The user trust perception model uses the trust level evaluation of network information on C2C websites as the index system. Suppose there are trust attribute clouds TPC1, TPC2 and their mathematical properties are Ex1, En1, He1, Ex2, En2, He2 respectively. using the algorithm of this paper, the response output of the mutual correlation function of e-logistics users is calculated as shown in Fig. 1.

Fig. 1.
figure 1

e-Logistics user correlation function response output

As seen in Fig. 1, the algorithm of this paper is used for the mutual correlation function feature analysis, based on the mutual correlation criterion, the feature extraction accuracy is high, and the estimation performance of the trust degree of e-logistics is superior, for the trust attribute cloud TPC1 generates a normal random number W1 with En1, He12 as variance, and the trust value is calculated as 6.2 by the division of the trust interval with low confidence as [3.5–6.5]. In order to compare the performance of the algorithm, the simulation experiment of the progressive control accuracy of the trust degree of e-logistics is carried out using the algorithm of this paper and the traditional algorithm, and the results are obtained as shown in Fig. 2.

Fig. 2.
figure 2

Progressive control accuracy of e-logistics trust degree

In Fig. 2, assuming that the historical trust degree and the current trust degree are weighted half each, since the trust degree of the previous evaluation is 6, then the trust degree of the network transaction of this e-logistics merchant is 6 × 50% + 6.2 × 50% = 6.1. Comparing the control accuracy of this paper’s algorithm and the traditional algorithm, we get that this paper’s algorithm has better asymptotic control performance, accurate evaluation and higher estimation accuracy.

5 Conclusion

The design of the logistic trust degree progressive control model for e-commerce is used to carry out the trust degree rating of network entity objects and improve the quantitative evaluation performance of merchants. The traditional e-logistics trust degree control model uses the model design method of autocorrelation function analysis, which is not effective in evaluation due to the large subjectivity of autocorrelation feature analysis. A progressive control model of trust degree of e-logistics based on inter-correlation criterion is proposed. Firstly, the resource database structure model of e-logistics is constructed, and based on the mutual correlation criterion, the e-logistics user recommendation model is constructed and the network trust degree control model is implemented to improve the algorithm, and the simulation experiments show that the algorithm in this paper has good asymptotic control performance, accurate evaluation and high estimation accuracy. The asymptotic control of e-logistics trust degree based on the mutual correlation criterion is realized to improve the management and control benefits of e-logistics merchants.