• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.
Citation: Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.

Trajectory Outlier Detection Based on Semi-Supervised Technology

More Information
  • Published Date: November 14, 2011
  • With the increasing progress on GPS, RFID and wireless technologies, moving objects are becoming increasingly attractive to data mining community. Trajectory outlier detection has many practical applications, so it has been a popular data mining task. Existing trajectory outlier detection algorithms are sensitive to some parameters and need to manually adjust the parameters, which lead to some drawbacks of unstable and less robustness. Furthermore, most of existing algorithms detect outlying trajectories only according to self-defined dimension and use less information of known trajectories to assist in detecting more potential outlying trajectories. A new trajectory outlier detection algorithm based on semi-supervised technology is proposed in this paper. It makes full use of the information of this little known trajectory, which include the distribution of the known data and the user’s understanding of abnormal data. We use them to calculate sensitive key parameters by semi-supervised technology, and overcome the instability of existing algorithms which comes from sensitive key parameters. The algorithm detects valuable outlying trajectories with new dimension at global and local views. Experimental results show that the proposed algorithm can discover more valuable outlying trajectories with less parameter adjustment.
  • Related Articles

    [1]Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin. Survey of Protocol Security of Industrial Control System[J]. Journal of Computer Research and Development, 2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
    [2]He Kewen, Zhang Jiachen, Liu Xiaoguang, Wang Gang. Fingerprint Search Optimization for Deduplication on Emerging Storage Devices[J]. Journal of Computer Research and Development, 2020, 57(2): 269-280. DOI: 10.7544/issn1000-1239.2020.20190543
    [3]Zeng Gaoxiong, Hu Shuihai, Zhang Junxue, Chen Kai. Transport Protocols for Data Center Networks: A Survey[J]. Journal of Computer Research and Development, 2020, 57(1): 74-84. DOI: 10.7544/issn1000-1239.2020.20190519
    [4]Yan Fang, Li Yuanzhang, Zhang Quanxin, Tan Yu’an. Object-Based Data De-Duplication Method for OpenXML Compound Files[J]. Journal of Computer Research and Development, 2015, 52(7): 1546-1557. DOI: 10.7544/issn1000-1239.2015.20140093
    [5]Cao Jian, Wang Xingwei, Zhang Jinhong, Huang Min. A Data Driven Cognitive Routing Protocol for Information-Centric Networking[J]. Journal of Computer Research and Development, 2015, 52(4): 798-805. DOI: 10.7544/issn1000-1239.2015.20148404
    [6]Li Chao, Wang Shupeng, Yun Xiaochun, Zhou Xiaoyang, Chen Ming. A Reading Performance Improvement Method in Deduplication Based on Pipeline[J]. Journal of Computer Research and Development, 2013, 50(1): 90-100.
    [7]Zong Ming, Wang Xiaodong, and Zhou Xingming. Cost-Optimizing Adaptive Location Service Protocol in MANET[J]. Journal of Computer Research and Development, 2012, 49(12): 2515-2528.
    [8]Fu Yinjin, Xiao Nong, and Liu Fang. Research and Development on Key Techniques of Data Deduplication[J]. Journal of Computer Research and Development, 2012, 49(1): 12-20.
    [9]Jin Hai, Luo Fei, Zhang Qin, and Zhang Hao. An Efficient Data Transfer Protocol for P2P-Based High Performance Computing[J]. Journal of Computer Research and Development, 2006, 43(9): 1543-1549.
    [10]Liu Yi, Pang Liaojun, and Wang Yumin. An Optimistic Payment Protocol Based on Mobile Agents[J]. Journal of Computer Research and Development, 2005, 42(10): 1686-1691.

Catalog

    Article views (884) PDF downloads (481) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return