• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lu Feng, Wang Zirui, Liao Xiaofei, Jin Hai. Online Video Advertising Based on Fine-Grained Video Tags[J]. Journal of Computer Research and Development, 2014, 51(12): 2733-2745. DOI: 10.7544/issn1000-1239.2014.20131337
Citation: Lu Feng, Wang Zirui, Liao Xiaofei, Jin Hai. Online Video Advertising Based on Fine-Grained Video Tags[J]. Journal of Computer Research and Development, 2014, 51(12): 2733-2745. DOI: 10.7544/issn1000-1239.2014.20131337

Online Video Advertising Based on Fine-Grained Video Tags

More Information
  • Published Date: November 30, 2014
  • With the development of the Internet, it has been a trend of manual tagging, labeling and sharing videos. Rational use of these swarm intelligence will help to improve the effectiveness of video advertising. The method presented in this paper first collects the fine-grained user video tags, and generates the video hotspots by the video timeline-weighted method. Then, based on the idea of the classification matching, the description of the video hotspots can be used to select the advertising. At last, the time points that the popular attention has dropped by the biggest level are found to put advertising. Experiments show that, among the mega-scale video set, the content correlation between the hotspot and the advertisements selected by this method can reach 85%. The probability that the users close ads windows is less than 10%. Compared with the ads system that has been widely adopted so far, the average broadcast time of the new method can be increased by 21.5%, the click-through rate is improved from 0.65% to 0.73%.
  • Related Articles

    [1]Li Xinran, Li Rongshou, Qin Chuan, Qian Zhenxing, Zhang Xinpeng. Generative Information Hiding Method Based on Couplet Carrier[J]. Journal of Computer Research and Development, 2025, 62(3): 779-789. DOI: 10.7544/issn1000-1239.202330663
    [2]Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu. Intelligent and Efficient Method for Optimal Penetration Path Generation[J]. Journal of Computer Research and Development, 2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
    [3]He Yanxiang, Chen Yong, Wu Wei, Xu Chao, Li Qingan. Bus-Invert Encoding Oriented Low Power Scheduling Method[J]. Journal of Computer Research and Development, 2014, 51(8): 1773-1780. DOI: 10.7544/issn1000-1239.2014.20130066
    [4]Wang Changjing, Luo Haimei, Zuo Zhengkang. Formal Software Specification Generation Approach Based on Problem Patterns[J]. Journal of Computer Research and Development, 2013, 50(2): 352-360.
    [5]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [6]Luo Zuying, Pan Yuedou. Transistor-Level Methodology on Power Optimization for CMOS Circuits[J]. Journal of Computer Research and Development, 2008, 45(4): 734-740.
    [7]Zhou Hongwei, Zhang Chengyi, and Zhang Minxuan. A Method of Statistics-Based Cache Leakage Power Estimation[J]. Journal of Computer Research and Development, 2008, 45(2): 367-374.
    [8]Wen Dongxin, Yang Xiaozong, and Wang Ling. A High Level Synthesis Scheme and Its Realization for Low Power Design in VLSI[J]. Journal of Computer Research and Development, 2007, 44(7): 1259-1264.
    [9]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low Power Data Cache Design Based on Very Narrow-Width Value[J]. Journal of Computer Research and Development, 2007, 44(5): 775-781.
    [10]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low-Power Instruction Cache Design Based on Record Buffer[J]. Journal of Computer Research and Development, 2006, 43(4): 744-751.

Catalog

    Article views (1173) PDF downloads (733) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return