• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Miao Xue, Guo Xi, Wang Zhaoshun, Xie Yonghong. Convex Polygon Tree for Indexing Field-of-Views[J]. Journal of Computer Research and Development, 2022, 59(3): 706-719. DOI: 10.7544/issn1000-1239.20200689
Citation: Miao Xue, Guo Xi, Wang Zhaoshun, Xie Yonghong. Convex Polygon Tree for Indexing Field-of-Views[J]. Journal of Computer Research and Development, 2022, 59(3): 706-719. DOI: 10.7544/issn1000-1239.20200689

Convex Polygon Tree for Indexing Field-of-Views

Funds: This work was supported by the National Natural Science Foundation of China (61602031), the Fundamental Research Funds for the Central Universities (FRF-BD-19-012A, FRF-IDRY-19-023), and the National Key Research and Development Program of China (2017YFB0202303).
More Information
  • Published Date: February 28, 2022
  • Smart device, such as smart phones, can record their geographical positions and optical parameters into image files when capturing photos and videos. We can extract and use the information to restore the sector-shaped geographical area, which is known as the field-of-view (FOV). We store the images together with their FOVs in order to support the spatial queries on images. Typically, a user circles a region on the map as a query, and the computer returns the images which capture the region. In fact, the query is to find the FOVs that intersect with the query region. To make FOV queries fast, an index should be built. However, the existing indexes exploit the sector-shaped feature inadequately. We design a convex polygon tree to index pentagons which are the approximations of sectors. Each tree node is a k\+*-convex polygon, which encloses a set of polygons. The number of sides of the polygon must be no more than k, and the difference between the polygon and its elements should be minimized. We propose a submerging algorithm to compute such k\+*-convex polygons. To build a convex polygon tree, we insert FOVs iteratively. Each time we select a best leaf node for insertion. The selection criteria are to make the dead space and the increasing space as small as possible, and to make the overlap area between the old node and the FOV as large as possible. We also propose an FOV query algorithm based on the proposed convex polygon tree. The experimental results show that the convex polygon tree performs better than the existing indexes.
  • Related Articles

    [1]Deng Qingyong, Zuo Qinghua, Li Zhetao, Wang En, Guo Bin. Privacy-Preserving Bilateral Reputation Evaluation in Blockchain Based Crowdsensing[J]. Journal of Computer Research and Development, 2024, 61(11): 2681-2692. DOI: 10.7544/issn1000-1239.202440302
    [2]Liu Wei, Tang Congke, Ma Jie, Tian Zhao, Wang Qi, She Wei. A Federated Learning Model for Privacy Protection Based on Blockchain and Dynamic Evaluation[J]. Journal of Computer Research and Development, 2023, 60(11): 2583-2593. DOI: 10.7544/issn1000-1239.202330269
    [3]Ran Jinhao, Cai Dongliang. Attribute Signature Identity Authentication Scheme Based on Blockchain and Trusted Execution Environment[J]. Journal of Computer Research and Development, 2023, 60(11): 2555-2566. DOI: 10.7544/issn1000-1239.202330268
    [4]Zhong Lujie, Wang Mu. Blockchain-Enpowered Cooperative Resource Allocation Scheme for Computing First Network[J]. Journal of Computer Research and Development, 2023, 60(4): 750-762. DOI: 10.7544/issn1000-1239.202330002
    [5]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [6]Zhou Wei, Wang Chao, Xu Jian, Hu Keyong, Wang Jinlong. Privacy-Preserving and Decentralized Federated Learning Model Based on the Blockchain[J]. Journal of Computer Research and Development, 2022, 59(11): 2423-2436. DOI: 10.7544/issn1000-1239.20220470
    [7]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [8]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [9]Ren Yanbing, Li Xinghua, Liu Hai, Cheng Qingfeng, Ma Jianfeng. Blockchain-Based Trust Management Framework for Distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478. DOI: 10.7544/issn1000-1239.2018.20180073
    [10]Yu Hui, Zhang Zongyang, Liu Jianwei. Research on Scaling Technology of Bitcoin Blockchain[J]. Journal of Computer Research and Development, 2017, 54(10): 2390-2403. DOI: 10.7544/issn1000-1239.2017.20170416
  • Cited by

    Periodical cited type(8)

    1. 钱忠胜,黄恒,朱辉,刘金平. 融合层注意力机制的多视角图对比学习推荐方法. 计算机研究与发展. 2025(01): 160-178 . 本站查看
    2. 钱忠胜,肖双龙,朱辉,王晓闻,刘金平. 利用GRU双分支信息协同增强的长尾推荐模型. 计算机科学与探索. 2025(02): 476-489 .
    3. 黄康鹏,冯锋. 基于一维卷积神经网络的序列推荐算法. 计算机技术与发展. 2025(03): 172-178 .
    4. 黄玲,黄镇伟,黄梓源,关灿荣,高月芳,王昌栋. 图卷积宽度跨域推荐系统. 计算机研究与发展. 2024(07): 1713-1729 . 本站查看
    5. 张惠鹃,黄钦阳,胡诗彦,杨青,张敬伟. 完全图高阶关系驱动的链接预测. 计算机研究与发展. 2024(07): 1825-1835 . 本站查看
    6. 张劲羽,马晨曦,李超,赵中英. 基于三分支图外部注意力网络的轻量化跨域序列推荐. 计算机研究与发展. 2024(08): 1930-1944 . 本站查看
    7. 朱明朔,沈苏彬. 一种基于因果推断的序列推荐模型. 计算机技术与发展. 2024(09): 102-108 .
    8. 陈万志,王军. 时间感知增强的动态图神经网络序列推荐算法. 计算机工程与应用. 2024(20): 142-152 .

    Other cited types(20)

Catalog

    Article views (227) PDF downloads (117) Cited by(28)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return