The problems of AGMA (Automatic Graph Mining Algorithm) are improved and a novel algorithm, namely CRMA (Clustering Re-clustering Merging Algorithm) is proposed which can realize more reasonable community division for...
详细信息
Point-of-interest(POI) recommendation becomes an important research for location-based social networks, since it helps modern citizens to explore new locations in unvisited cites effectively according to their prefere...
详细信息
Point-of-interest(POI) recommendation becomes an important research for location-based social networks, since it helps modern citizens to explore new locations in unvisited cites effectively according to their preferences. However, the current POI recommendation methods are lack of a deep mining in all time slots features and their effects on recommendation. To this end, in this paper we propose a POI recommendation method(called UPT) by combining time slot features, user-based collaborative filtering and spatial influence. Firstly, we extract time interval feature and time slot based popularity feature from history check-in datasets on LBSNs using probability statistical analysis method. Then, we devise a POI recommendation method based on the proposed temporal features to achieve better performance. In UPT, user-based collaborative filtering and smoothing technique are used by adding each time slot influence, and the overall popularity of a location is combined with each time slot feature. Our experimental results on Foursquare and Gowalla datasets show that UPT outperforms baseline POI recommendation methods in precision and recall.
The Siamese network-based tracker has achieved competitive performance in the field of single target tracking because of its excellent tracking speed and tracking accuracy. When faced with target deformations, most Si...
详细信息
In recent years, closed frequent itemsets mining has become a hot topic. In this paper, we present an algorithm BCTCF, which is based on Bit complementary tree (BCTree) in order to mine closed frequent itemsets effici...
详细信息
In recent years, closed frequent itemsets mining has become a hot topic. In this paper, we present an algorithm BCTCF, which is based on Bit complementary tree (BCTree) in order to mine closed frequent itemsets efficiently. First we adopt bit vectors to compress the database and define a novel structure, BCTree, in which a node stores two bit vectors that are complementary and each path is given a prime value. Based on the left-most bit in the bit vectors we adopt a divide-and-conquer strategy which handles the itemsets separately and then according to the prime unique feature we can get the closed frequent itemsets quickly and it makes us need not to mine all the frequent itemsets first. Both the divide-and-conquer strategy and prime unique can decrease the runtime. Experiment results show that BCTCF is very effective and scalable.
Due to the randomness of the partition of grids, the edge points of clusters might be partitioned into the sparse grids. These points would become noise information out of clusters when we cluster data stream by grid-...
详细信息
Due to the randomness of the partition of grids, the edge points of clusters might be partitioned into the sparse grids. These points would become noise information out of clusters when we cluster data stream by grid-density based algorithm. A data stream clustering algorithm based on spatial directed graph with core, SDGCStream, is proposed. It uses the spatial directed graph and the orthocenter of the sparse grids to handle the edge points of clusters. At first, the algorithm defines a structure SDGC (Spatial Directed Graph with Core) to store the summary statistics of data stream. The vertices of SDGC are maintained as the stream arriving. When the clustering quest comes, the edge information is generated. The initial clustering results are got through clustering on SDGC, then we judge whether the points of sparse grids which are adjacent to the border of a cluster belong to the cluster according to the orthocenter information and the border vertices of SDGC. At last, a strategy based on the distance between clusters is presented to adjust the clustering results after handling the border of clusters. The experimental results on synthetic and real datasets show the better validity of SDGCStream on handling the edge data points of clusters, and the scalability as the increasing of the length and dimensions of data stream.
The inuence maximization problem is defined as providing a given initial integer k, mining top-k inuential nodes from a social network such that the spread of inuence in the network is maximized. Some existing studies...
详细信息
The inuence maximization problem is defined as providing a given initial integer k, mining top-k inuential nodes from a social network such that the spread of inuence in the network is maximized. Some existing studies are based on Greedy algorithm, but their time complexity is very high. In this paper, a different method based on Genetic Algorithms, denoted as MAGA is proposed. In the MAGA algorithm, the set of k nodes is seen as a candidate solution, and the expected inuence value as fitness. Use the genetic algorithm to get the optimal solution. Experiments show that the algorithm achieved a balance in inuence spread and running time.
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificia...
详细信息
ISBN:
(纸本)9781538684986;9781538684979
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificial intelligence, virtual reality, high-speed network and digital reading, the concept of "VR" has been applied to more and more industries. The introduction of VReading multi-sensory reading platform will bring new ideas to digital reading industry.
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune ...
详细信息
ISBN:
(纸本)9781510803084
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which users are not interested in and shortens the running time. It adopts histogram statistic pattern to get the standardization description to item interval of the mining patterns, making the mining sequences include the item interval information which is valuable to user decision.
This paper discusses the simulated computation methods of remote sensing information model, and tries to put forward a more available solution. It presents our research works on the description and simulation methods ...
详细信息
The main purpose of studying the software structure is considered to understand and recognize the structure easily by also taking into account the quality of software. In this paper, we define and analyze the node imp...
详细信息
暂无评论