期刊文献+

基于自注意力机制的用户画像

User portrait based on self-attention mechanism
下载PDF
导出
摘要 传统的词向量模型生成的词向量,存在着难以表达出一词多义和学习到词与词之间的依赖关系的问题。针对于此,本文提出基于自注意力机制的用户画像。首先采用自注意力机制,将所有单词信息编码进每一个单词中,学习查询句中词的语义,理解一词多义、一义多词。然后利用多头注意力机制提升模型能力,全面理解查询句中词与词之间的复杂语义。最后利用支持向量机(SVM)分类算法,得到用户基本属性的分类结果,构建用户画像。实验结果表明,模型分类精度高于使用词向量模型和LDA模型方法的分类精度。 The word vector generated by the traditional word vector model is difficult to express the polysemy of a word and to learn the dependence between words.In view of this,this paper proposes a user portrait based on self-attention mechanism.Firstly,the self-attention mechanism is adopted to encode all word information into each word,learn the semantics of the words in the query sentence,and understand polysemy and polysemy.Then the multi-head attention mechanism is used to improve the model’s ability to fully understand the complex semantics between words in the query sentence.Finally,support vector machine(SVM)classification algorithm is used to get the classification results of the basic attributes of users,and the user portrait is constructed.The experimental results show that the classification accuracy of the model is higher than that of the word vector model and LDA model.
作者 张维 陈泽宇 ZHANG Wei;CHEN Zeyu(School of Electrical and Electronic Engineering,Shanghai University of Engineering and Technology,Shanghai 201620,China)
出处 《智能计算机与应用》 2020年第12期49-53,共5页 Intelligent Computer and Applications
关键词 自注意力机制 词向量模型 用户画像 SVM Self-attention mechanism Word vector User portrait SVM
  • 相关文献

参考文献5

二级参考文献30

  • 1Idc.Worldwide Quarterly Mobile Phone Tracker.2014.
  • 2Lee S C,Paik J,Ok J,et al.Efficient mining of user behav-iors by temporal mobile access patterns [J].Intl J.ComputerScience Security,2007,7 (2):285-291.
  • 3Chen T S,Chou Y S,Chen T C.Mining user movement be-havior patterns in a mobile service environment [J].Systems,Man and Cybernetics,Part A:Systems and Humans,IEEETransactions on,2012,42 (1):87-101.
  • 4Yava?G,Katsaros D,Ulusoy,et al.A data mining ap-proach for location prediction in mobile environments [J].Da-ta & Knowledge Engineering,2005,54 (2):121-146.
  • 5Baratchi M,Meratnia N,Havinga P J M.Recognition of pe-riodic behavioral patterns from streaming mobility data [M].Mobile and Ubiquitous Systems:Computing, Networking,and Services.Springer International Publishing,2014:102-115.
  • 6Li Z,Ding B,Han J,et al. Mining periodic behaviors formoving objects [C]∥Proceedings of the 16th ACM SIGKDDinternational conference on Knowledge discovery and data min-ing.ACM,2010:1099-1108.
  • 7Zhang M,Kao B,Cheung D W,et al.Mining periodic pat-terns with gap requirement from sequences [J].ACM Trans-actions on Knowledge Discovery from Data (TKDD),2007,1(2):7.
  • 8Ji Y,Zhang C,Zuo Z,et al. Mining user daily behaviorbased on location history [C] ∥Communication Technology(ICCT),2012IEEE 14th International Conference on.IEEE,2012:881-886.
  • 9Zhu Y,Zhang Y,Shang W,et al.Trajectory enabled serv-ice support platform for mobile usersbehavior pattern mining[C]. Mobile and Ubiquitous Systems:Networking & Serv-ices,MobiQuitous,2009.MobiQuitous09.6th Annual In-ternational.IEEE,2009:1-10.
  • 10Lu E H C,Tseng V S,Yu P S.Mining cluster-based tem-poral mobile sequential patterns in location-based service envi-ronments [J].IEEE Transactions on knowledge and data engi-neering,2011,23 (6):914-927.

共引文献249

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部