期刊文献+

基于时间序列的轨迹数据相似性度量方法研究及应用综述 被引量:18

Research and application survey of similarity measurement methods on trajectory data based on time series
下载PDF
导出
摘要 移动通信和传感设备等位置感知技术的发展,将人和事物的地理位置数据化。由此形成的轨迹数据正以极快的速度产生并呈指数级增长。轨迹数据中蕴含着丰富的信息,对其分析和挖掘具有重要的社会和应用价值。轨迹相似性度量研究是轨迹数据管理和分析的基础,在轨迹计算中起决定性作用。轨迹相似性度量通常以时间、空间或若干关键词作为参数,度量轨迹之间的相似程度。本文总结归纳了现有的轨迹相似性度量经典研究工作。首先,总结归纳了轨迹大数据的高维异构、多粒度、不确定、高冗余的特点,对轨迹的相似性度量问题进行了形式化的描述。其次,依据不同的数据类型,就经典的空间相似性、文本相似性和时间相似性的评价方法分别进行了说明和总结;依据轨迹形式与度量范围,将现有工作分为了基于离散点的轨迹全局和局部相似性,基于线段的轨迹全局和局部相似性的计算方法,并评价了各种方法的优缺点。再次,分析了轨迹相似性度量在交通管理、城市规划、智能推荐、智慧出行等领域的具体应用。最后,总结展望了轨迹相似性度量在未来研究与应用方面的发展方向。 The development of location-aware technologies such as mobile communications and sensing devices digitizes the geographic location of people and objects.Trajectory data is generating at an extremely fast rate and growing exponentially.Trajectory data contains a wealth of information.It shows great value of the applications based on analyzing and mining trajectory data.Trajectory similarity measurement research is the basis of trajectory data management and analysis,it plays a decisive role in trajectory calculation.To the best of our knowledge,trajectory similarity measure usually takes the temporal,spatial,or textual information as the parameters.The existing classical research works on trajectory similarity are inducted.Firstly,four features of big trajectory data,such as high dimensional heterogeneity,multi-granularity,uncertainty and high redundancy with noise,are summarized and then the trajectory similarity problem is formed.Secondly,the well-known measurements on spatial similarity,text similarity and time similarity are summarized according to different data type.Based on the trajectory form and the measurement range,the existing similarity work can be divided into four categories,i.e.The global and local trajectory similarity on discrete points,global and local similarity of trajectory on segment.Thirdly,various applied scenarios are discussed,including traffic management,urban planning,intelligent recommendation,smart travel,and so on.Finally,the development direction of trajectory similarity measurement on research problem and application scenarios are predicted.
作者 潘晓 马昂 郭景峰 吴雷 刘风阳 PAN Xiao;MA Ang;GUO Jingfeng;WU Lei;LIU Fengyang(School of Economic and Management,Shijiazhuang Tiedao University,Shijiazhuang,Hebei 050043,China;School of Information Science and Engineering,Yanshan University,Qinhuangdao,Hebei 066004,China;School of Software,Tianjin Normal University,Tianjin,300387,China)
出处 《燕山大学学报》 CAS 北大核心 2019年第6期531-545,共15页 Journal of Yanshan University
基金 国家自然科学基金资助项目(61472340,61772533) 河北省自然科学基金资助项目(F2018210109) 河北省教育厅重点项目(ZD2018040) 河北省引进留学人员资助项目(C201822) 河北省基础研究团队项目 石家庄铁道大学第四届优秀青年科学基金项目(Z661250444)
关键词 相似性度量 轨迹数据 轨迹计算 移动计算 similarity measurement trajectory data trajectory computing mobile computing
  • 相关文献

参考文献8

二级参考文献115

  • 1潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 2Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 3Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 4Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 5Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 6Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.
  • 7Bettini C, Wang S X, Jajodia S. Protecting privacy against location-based personal identification//Proceedings of the 2nd VLDB workshop on Secure Data Management (SDM2005). Trondheim, 2005:185-199.
  • 8Krumm J. Inference attacks on location tracks//Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE 2007). Toronto, 2007:127-143.
  • 9Luper D, Cameron D, Miller J A, Arabnia H R. Spatial and temporal target association through semantic analysis and GPS data mining//Proceedings of the 2007 International Conference on Information & Knowledge Engineering (IKE 2007). LasVegas, 2007:251-257.
  • 10Xu T, Cai Y. Exploring historical location data for anonymity preservation in location-based services//Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008). Phoenix, 2008:547-555.

共引文献303

同被引文献190

引证文献18

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部