期刊文献+

基于轨迹时空词向量的用户年龄特征识别

User Age Group Recognition Based on Spatio-Temporal Word Embedding of Trajectory
下载PDF
导出
摘要 用户移动上网访问基站的轨迹数据从时间和空间上反映了用户的生活习惯和行为模式。时间和空间信息同时产生不应分别考虑。因此,该文在传统的TF-IDF方法基础上提出了与时间相关的TFT-IDFT方法,用以提取轨迹点语义信息,进而采用word2vec方法将轨迹数据转化为文档分析。提取包含位置信息和语义信息的轨迹时空词向量,在此基础上建立多分类模型对用户所属年龄段进行识别。实验结果表明,改进的TFT-IDFT方法在提取轨迹语义时更具合理性,且基于此方法构建的轨迹时空词向量应用于分类模型,对用户所属年龄阶段的识别效果更好。 The trajectory data generated from users’mobile access to base stations reflect their life styles and behavior patterns in terms of both time and space.Based on the fact that temporal and spatial information are produced simultaneously,this paper proposes a TFT-IDFT method to extract semantic information from trajectories.First,a word embedding method named word2 vec is applied to build trajectory word vectors which include users’geometric and semantic information.Then,classification methods are used on these vectors to discriminate user age groups.The result shows that TFT-IDFT is more applicable than TF-IDF in the task of extracting semantic trajectories,and word vectors based on this method performs better in the age classification task.
作者 吴浩 张威强 张朋柱 WU Hao;ZHANG Weiqiang;ZHANG Pengzhu(Antai College of Economics&Management,Shanghai Jiao Tong University,Shanghai 200030,China)
出处 《中文信息学报》 CSCD 北大核心 2019年第7期118-127,共10页 Journal of Chinese Information Processing
基金 国家自然科学基金(91646205,71421002) 上海交通大学中央高校基本科研业务费资助项目(16JCCS08)
关键词 语义轨迹 词频—逆文本频率 词向量 Word2vec 分类 sematic trajectory TF-IDF word embedding word2vec classification
  • 相关文献

参考文献5

二级参考文献68

  • 1Vieweg S, Hughes A L, Starbird K L. Mieroblogging during two natural hazards events: What twitter may contribute to situa- tional awareness[C]//Proceeding of CHI. 2010:1079-1088.
  • 2Java A, Song X, Finin T. Why we twitter: Understanding mi- croblogging usage and communities[C]//Proceeding of WebK- DD/SN AKDD. 2007.
  • 3Kwak H,Lee C,Park H,et al. What is Twitter,a social network or a news media[C]//Proceeding of WWW. 2010.
  • 4Bernardo A H, Daniel M, Romero, et al. Social networks that matter: Twitter under the mieroscope [ J ]. First Monday, 2009, 14(1).
  • 5Baekstrom L, Sun E, Marlow C. Find me if you can: improving geographical prediction with social and spatial proximity[C]// WWW. 2010:61-70.
  • 6Cheng Z,Caverlee J, Lee K. You are where you tweet: a content- based approach to geo-locating twitter users[M]. ACM CIKM, 2010 : 759-768.
  • 7Lindqvist J, Cranshaw J, Wiese J, et al. I ' m the mayor of my house: examining why people use foursquare-a social-driven lo- cation sharing applieation[M]. ACM CHI, 2011 : 2409-2418.
  • 8Kostakos V, Venkatanathan J, Reynolds B. Who's Your Best Friend-Targeted Privacy Attacks In Location-sharing Social Networks[C]// Proceedings of UbiComp' 11. Beijing, China: ACM Press,September 2011:177-186.
  • 9Zhiyuan C,James C,Kyumin L, et al. Exploring Millions of foot- prints in location Sharing Serviees[C] // ICWSM. 2011.
  • 10Gonzalez M C, Hidalgo C A, Barabasi A L. Understanding indi- vidual human mobility pattems[J]. Proceedings of ACL, 2008, 453(7196) :779-782.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部