期刊文献+

符号数据的无监督学习:一种空间变换方法 被引量:2

Unsupervised Learning from Categorical Data:A Space Transformation Approach
下载PDF
导出
摘要 近年来符号数据的无监督学习在模式识别、机器学习、数据挖掘和知识发现等诸多领域扮演着越来越重要的角色。然而现有的针对符号数据的聚类算法(经典的K-modes系列算法等),相比数值型数据的聚类算法,在性能方面仍然有很大的提升空间。其根本原因在于符号数据缺乏类似数值数据那样清晰的空间结构。为了能够有效地发掘符号数据内在的空间结构,采用了一种全新的数据表示方案:空间变换方法。该方法将符号数据映射到相应的由原来的属性组成的新的维度的欧氏空间中。在这一框架的基础上,为了找到符号数据更有代表性的模式,结合CarreiraPerpin提出的K-modes算法进行无监督学习。在9个常用的UCI符号数据集上进行了测试,与传统的符号数据聚类算法进行了实验比较,结果表明几乎在所有的数据集上提出的方法都是更加有效的。 The unsupervised learning method of categorical data plays a more and more important role in such areas as pattern recognition,machine learning,data mining and knowledge discovery in the recent years.Nevertheless,in view of many existing clustering algorithms for categorical data(the classical k-modes algorithm and so on),there is still a large room for improving their clustering performance in comparison with the performance of clustering algorithms for numeric data.This may arise from the fact that categorical data lack a clear space structure as that of numeric data.To effectively discover the space structure inherent in a set of categorical objects,we adopted a novel data representation scheme:a space transformation approach,which maps a set of categorical objects into a corresponding Euclidean space with the new dimensions constructed by each of the original features.Based on the new general framework for categorical clustering,we employed the Carreira-Perpin's K-modes algorithm for clustering to find more representative modes.The performance of the new proposed method was tested on the nine frequently-used categorical data sets downloaded from the UCI.Comparisons with the traditional clustering algorithms for categorical data illustrate the effectiveness of the new method on almost all data sets.
出处 《计算机科学》 CSCD 北大核心 2016年第1期89-93,121,共6页 Computer Science
基金 国家优秀青年基金项目(61322211) 教育部新世纪人才支持计划(NCET-12-1031) 教育部博士点专项科研基金项目(20121401110013) 山西省青年学术带头人(20120301)资助
关键词 符号数据 数据表示方案 空间变换 Categorical data Data representation scheme Space transformation
  • 相关文献

参考文献13

  • 1Park J,Sandhu R,Cheng Y. Acon: Activity-centric access con- trol for social computing[C] // 2011 Sixth International Confe- rence on Proc. of Availability, Reliability and Security (ARES). IEEE, 2011 .. 242-247.
  • 2Mahmood S. Online Social Networks:Privacy Threats and De- fenses[M] // Security and Privacy Preserving in Social Net- works. Springer Vienna, 2013 : 47-71.
  • 3Hu Hong-xin, Gail-Joon Ahn, Jan Jorgensen. Multiparty Access Control for Online Social Networks: Model and Mechanisms[J]. Proc. of IEEE Transactions on Knowledge and Data Enginee- ring,2013,25(7) : 1614- 1627.
  • 4Thomas K,Grier C, Nicol D M. unfriendly: Multi-party privacy risks in social networks[C]//Proc, of Privacy Enhancing Tech- nologies. Springer Berlin Heidelberg, 2010 : 236-252.
  • 5Squicciarini A C, Shehab M, Wede J. Privacy policies for shared content in social network sites[J]. The VLDB Journal-The In- ternational Journal on Very Large Data Bases, 2010,19 (6) : 777- 796.
  • 6Amrutha P, Sathiyaraj R. Privacy Management of Multi User Environment in Online Social Networks (OSNs)[J]. GJCST-E: Network,Web &Security,2013,13(10):01-07.
  • 7Subhani S,Rajasekhar M. A photo privacy for tagged images u- sing rule-based access control in social networks[J]. Interna-tional Journal of Research Sciences and Advanced Engineering, 2012,2(5) :45-49.
  • 8Yeung C A,Kagal L,Gibbins N,et al. Providing Access Control to Online Photo Albums Based on Tags and Linked Data[C]// Proc. of AAAI Spring Symposium.. Social Semantic Web:Where Web 2. 0 Meets Web 3.0. 2009..9-14.
  • 9钟勇,张宏,刘凤玉,秦小麟.一种基于逻辑框架的数字版权管理机制和实现[J].计算机研究与发展,2010,47(2):223-230. 被引量:8
  • 10Bertino E, Catania B, Gori R, et al. Active-U-Datalog: integrating active rules in a logical update language [C]//Proc. of Interna- tional Seminar on Logic Databases and the Meaning of Change, LNCS 1472. Berlin: Springer, 1998 : 107-133.

二级参考文献10

  • 1俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 2肖尚勤,卢正鼎,凌贺飞,邹复好.基于P2P系统信任机制的DRM模型[J].计算机研究与发展,2007,44(4):567-573. 被引量:7
  • 3Chong C N, Corin R, Doumen J, et al. LicenseScript: A logical language for digital rights management[ J]. Annales des Telecommunications, 2006, 61(3/4): 284-331.
  • 4Gunter C A, Weeks S T, Wright A K. Models and languages for digital rights [C] //Proc of the 34th Annual Hawaii Int Conf on Systems Sciences. Los Alamitos, CA: IEEE Computer Society, 2001:4034-4038.
  • 5Pucella R, Weissman V. A logic for reasoning about digital rights [C] //Proc of the 15th IEEE Computer Security Foundations Workshop. Washington: IEEE, 2002: 282-294.
  • 6Bertino E, Catania B, Gori R, et al. Active-U-Datalog: Integrating active rules in a logical update language [G] // LNCS 1472: Proc of Int Seminar on Logic Databases and the Meaning of Change. Berlin: Springer, 1998:107-133.
  • 7Montesi D, Bertino E, Martelli M. Transactions and updates in deductive databases[J]. IEEE Trans on Knowledge and Data Engineering, 1997, 9(5): 784-797.
  • 8Zhong Yong, Zhu Zhen, Lin Dongmei, et al. A method of fair use in digital rights management [G]//LNCS 4822 : Proc of the 10th Int Conf on Asian Digital Libraries. Berlin: Springer, 2007:160-164.
  • 9Chong C N, Ren B, Doumen J M, et al. License protection with a tamper-resistant token [G] //LNCS 3325:Proc of the 5th Int Workshop Information Security Applications. Berlin: Springer, 2004:223-227.
  • 10钟勇,秦小麟,刘凤玉.ODRL权利描述语言逻辑实施机制研究[J].计算机科学,2009,36(4):133-139. 被引量:7

共引文献7

同被引文献12

引证文献2

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部