期刊文献+

一种基于多态关联挖掘的位置服务优化查询方法 被引量:1

Optimized Query Method of Location-based Service with Polymorphic Association Mining
下载PDF
导出
摘要 高效可靠的位置服务查询方法是位置服务广泛应用的关键。传统的位置服务查询方法采用近邻查询的方法,在对近邻的分割时往往面临稳定性差的问题,无法实现高效查询。提出一种基于多态关联挖掘的位置服务优化查询方法,该方法根据查询标准,将数据分为多个状态,然后对多个状态进行关联挖掘,提取数据的深层次特征,根据深层次特征,对位置服务的查询方法进行优化查询来提高系统查询的效率和可靠性。采用查全率和查准率作为衡量标准,对200组数据进行了实际分析,结果显示,基于多态关联挖掘的位置服务查询方法使查全率和查准率分别提高9.5%和8.8%,研究成果在位置服务和信息挖掘中具有很好的应用价值。 High efficient and reliable location-based service (LBS) is key for the wide use of LBS. In traditional method, the neighbor query of location-based services query is used, and the neighborhood stability is often faced with the prob- lem of poor ability, so it is unable to achieve high efficient query. An optimized query method of location-based service with polymorphie association mining was proposed. According to the search criteria, the data is divided into more than one state, then the multiple state association mining is carried out, and the depth features of data were extracted, and ac- cording to the deep-seated characteristics of the location services available method, the efficiency and reliability of the system queries are improved. An actual analysis was carried out using a team of 200 groups of data, and the result shows that with polymorphic association mining method, the recall and precision rate are increased by 9. 50% and 8. 8%, so it has a good application value in LBS and information mining.
出处 《计算机科学》 CSCD 北大核心 2014年第1期286-289,共4页 Computer Science
基金 国家自然科学基金(61073041,61073043,61202274,61370083) 高等学校博士学科点基金(20112304110011,20122304110012)资助
关键词 多态性 关联挖掘 位置服务 优化查询 Polymorphism, Association mining, Location-based service,Optimized query
  • 相关文献

参考文献14

二级参考文献187

共引文献277

同被引文献15

  • 1Kido H, Yanagisawa Y, Satoh T. An anonymous communication technique using dummies for location-based services[C]//Inter- national Conference on Pervasive Services, 2005 ( ICPS' 05 ). 1EEE, 2005 : 88-97.
  • 2Gruteser M, Grunwald D. Anonymous usage of location based services through spatial and temporal eloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applica- tions and Services. ACM, 2003 : 31-42.
  • 3Gedik B, Liu L. Protecting location privacy with personalized k- anonymity:Architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7 ( 1 ) : 1-18.
  • 4Mokbel M F, Chow C Y, Aref W G. The new Casper: query pro- cessing for location services without compromising privaey[C]// Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment, 2006 : 763-774.
  • 5Yiu M L,Jensen C S, Huang X, et al. Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services[C]//IEEE 24th International Con- ference on Data Engineering, 2008 (ICDE 2008). tEEE, 2008 : 366-375.
  • 6Pan X, Xu J, Meng X. Protecting location privacy against loca- tion-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering,2012,24(8) : 1506-1519.
  • 7Li Qian-mu, Zhang Hong. Information Security Risk Assessment Technology of Cyberspace: a Review[J]. Information- an Inter- national Interdisciplinary Journal, 2012,15 ( 11 ) : 4677-4684.
  • 8Brinkhoff T. A framework for generating network-based moving objects[J]. GeoInformatica, 2002,6 (2): 153-180.
  • 9Li Qian mu, Hou Jun,Qi Yong, et al. The Rule Engineer Model on the high-speed processing of Disaster Warning Information [J]. Disaster Advances,2012,5(4) :432-437.
  • 10Shin K G,Ju X,Chen Z, e:t al. Privacy protection for users of lo- cation-based services [J ]. Wireless Communications, IEEE, 2012,19(1):30-39.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部