• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fang Yuan, Wang Lizhen, Wang Xiaoxuan, Yang Peizhong. Spatial Occupancy-Based Dominant Co-Location Patterns Mining[J]. Journal of Computer Research and Development, 2022, 59(2): 264-281. DOI: 10.7544/issn1000-1239.20210913
Citation: Fang Yuan, Wang Lizhen, Wang Xiaoxuan, Yang Peizhong. Spatial Occupancy-Based Dominant Co-Location Patterns Mining[J]. Journal of Computer Research and Development, 2022, 59(2): 264-281. DOI: 10.7544/issn1000-1239.20210913

Spatial Occupancy-Based Dominant Co-Location Patterns Mining

Funds: This work was supported by the National Natural Science Foundation of China (61966036, 61662086), the Project of Innovative Team of Yunnan Province (2018HC019), and the Post Doctor Foundation of Yunnan University (C176220200).
More Information
  • Published Date: January 31, 2022
  • Traditional spatial co-location pattern mining aims to discover the subset of spatial feature set whose instances are prevalently located together in geographic neighborhoods. Most previous studies take the prevalence of patterns as an interestingness measure. However, It may well be that users are not only interested in identifying the prevalence of a feature set, but also its completeness, namely the portion of co-location instances that a pattern occupies in their neighborhood. Combining the prevalence and completeness of co-location patterns, we can provide users with a set of higher quality co-location patterns called dominant spatial co-location patterns (DSCPs). In this paper, we introduce an occupancy measure into the spatial co-location pattern mining task to measure the completeness of co-location patterns. Then we formulate the problem of DSCPs mining by considering both the completeness and prevalence. Thirdly, we present a basic algorithm for discovering DSCPs. In order to reduce the high computational cost, a series of pruning strategies are given to improve the algorithm efficiency. Finally, the experiments are conducted both on synthetic and real-world data sets, and the efficiency and effectiveness of the proposed algorithms are evaluated. The running time on synthetic data sets shows our pruning strategies are efficient. The mining results in two real-world applications demonstrate that DSCPs are reasonable and acceptable.
  • Related Articles

    [1]Zhang Hao, Wu Jianxin. A Survey on Unsupervised Image Retrieval Using Deep Features[J]. Journal of Computer Research and Development, 2018, 55(9): 1829-1842. DOI: 10.7544/issn1000-1239.2018.20180058
    [2]Shan Yanhu, Zhang Zhang, Huang Kaiqi. Visual Human Action Recognition: History, Status and Prospects[J]. Journal of Computer Research and Development, 2016, 53(1): 93-112. DOI: 10.7544/issn1000-1239.2016.20150403
    [3]Li Kenli, Guo Li, Tang Zhuo, Jiang Yong, and Li Renfa. A Molecular Solution for the Ramsey Number on DNA-Based Supercomputing[J]. Journal of Computer Research and Development, 2011, 48(3): 447-454.
    [4]Zhai Weiming, Sheng Lin, Song Yixu, Zhao Yangnan, Wang Hong, Jia Peifa. Image Guided Computer Assisted Microwave Ablation for Liver Cancer[J]. Journal of Computer Research and Development, 2011, 48(2): 281-288.
    [5]Guo Kangde, Zhang Mingmin, Sun Chao, Li Yang, Tang Xing. 3D Fingertip Tracking Algorithm Based on Computer Vision[J]. Journal of Computer Research and Development, 2010, 47(6): 1013-1019.
    [6]Shu Bo, Qiu Xianjie, Wang Zhaoqi. Survey of Shape from Image[J]. Journal of Computer Research and Development, 2010, 47(3): 549-560.
    [7]Zhao Hongwei, Wang Hui, Liu Pingping, and Dai Jinbo. A Computer Model of Directional Visual Attention[J]. Journal of Computer Research and Development, 2009, 46(7): 1192-1197.
    [8]Li Kenli, Liu Jie, Yang Lei, Liu Wenbin. An O(1.414\+n) Volume Molecular Solutions for the Exact Cover Problem on DNA-Based Supercomputing[J]. Journal of Computer Research and Development, 2008, 45(10): 1782-1788.
    [9]Xiong Tinggang, Ma Zhong, Yuan Youguang. Research on Synchronization Technology of Fault-Tolerant Computer System Based on Operating System Calls[J]. Journal of Computer Research and Development, 2006, 43(11): 1985-1992.
    [10]Zhang Liangguo, Gao Wen, Chen Xilin, Chen Yiqiang, Wang Chunli. A Medium Vocabulary Visual Recognition System for Chinese Sign Language[J]. Journal of Computer Research and Development, 2006, 43(3): 476-482.
  • Cited by

    Periodical cited type(6)

    1. 王博,万良,叶金贤,刘明盛,孙菡迪. 融合稀疏注意力机制在DDoS攻击检测中的应用. 计算机工程与设计. 2024(05): 1312-1320 .
    2. 刘泽坤,宫鑫,刘秀,安龙,吕延滨,刘欣. 基于电力数据中台的行为审计工具建设. 电力大数据. 2024(02): 62-68 .
    3. 崔峻玮,翟亚红. 近邻成分分析下的DDoS攻击检测. 湖北汽车工业学院学报. 2023(02): 36-41 .
    4. 冯景瑜,张静,时翌飞. 物联网中具备终端匿名的加密流量双层过滤方法. 西安邮电大学学报. 2023(02): 72-81 .
    5. 王冲,魏子令,陈曙晖. 基于自注意力机制的无边界应用动作识别方法. 计算机研究与发展. 2022(05): 1092-1104 . 本站查看
    6. 邹福泰,俞汤达,许文亮. 基于隐马尔可夫模型的加密恶意流量检测. 软件学报. 2022(07): 2683-2698 .

    Other cited types(4)

Catalog

    Article views (341) PDF downloads (213) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return