Computer Science ›› 2021, Vol. 48 ›› Issue (9): 59-67.doi: 10.11896/jsjkx.210100014
Special Issue: Intelligent Data Governance Technologies and Systems
• Intelligent Data Governance Technologies and Systems • Previous Articles Next Articles
SONG Jia-geng, ZHANG Fu-sang, JIN Bei-hong, DOU Zhu-mei
CLC Number:
[1]ZHENG Y,CAPRA L,WOLFSON O,et al.Urban computing:concepts,methodologies,and applications[J].ACM Transactions on Intelligent Systems and Technology (TIST),2014,5(3):1-55. [2]YUAN N J,ZHENG Y,XIE X.Discovering functional zones in a city using human movements and points of interest[M]//Spatial Analysis and Location Modeling in Urban and Regional Systems.Berlin,Heidelberg:Springer,2018:33-62. [3]CUI G.Personalized Travel Route Recommendation Based onGPS Trajectories[J].International Journal of Digital Earth,2018,11(12):1-24. [4]YI X,DUAN Z,LI T,et al.Citytraffic:Modeling citywide traffic via neural memorization and generalization approach[C]//Proceedings of the 28th ACM International Conference on Information and Knowledge Management.2019:2665-2671. [5]PAN Z,LIANG Y,WANG W,et al.Urban traffic prediction from spatio-temporal data using deep meta learning[C]//Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.2019:1720-1730. [6]ZHENG Y.Location-based social networks:Users[M]//Computing with Spatial Trajectories.New York,NY:Springer,2011:243-276. [7]SU H,LIU S,ZHENG B,et al.A survey of trajectory distance measures and performance evaluation[J].The VLDB Journal,2020,29(1):3-32. [8]PELEKIS N,KOPANAKIS I,MARKETOS G,et al.Similarity search in trajectory databases[C]//14th International Sympo-sium on Temporal Representation and Reasoning (TIME'07).IEEE,2007:129-140. [9]MONREALE A,PINELLI F,TRASARTI R,et al.WhereNext:A location predictor on trajectory pattern mining[C]//Procee-dings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Paris,France:ACM,2009. [10]ZHENG Y,ZHANG L,MA Z,et al.Recommending friends and locations based on individual location history[J].ACM Transactions on the Web (TWEB),2011,5(1):1-44. [11]GIANNOTTI F,NANNI M,PINELLI F,et al.Trajectory pattern mining[C]//Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2007:330-339. [12]YE Y,ZHENG Y,CHEN Y,et al.Mining individual life pattern based on location history[C]//2009 tenth International Confe-rence on Mobile Data Management:Systems,Services and Middleware.IEEE,2009:1-10. [13]PEI J,HAN J W,MORTAZAVI-ASL B,et al.PrefixSpan:mi-ning sequential patterns efficiently by prefix-projected pattern growth[C]//17th International Conference on Data Enginee-ring.2001:215-224. [14]TSAI C Y,LIOU J J H,CHEN C J,et al.Generating touring path suggestions using time-interval sequential pattern mining[J].Expert Systems with Applications,2012,39(3):3593-3602. [15]LI Z,DING B,HAN J,et al.Mining periodic behaviors for mo-ving objects[C]//Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2010:1099-1108. [16]ZHENG K,ZHENG Y,YUAN N J,et al.On discovery of ga-thering patterns from trajectories[C]//2013 IEEE 29th International Conference on Data Engineering (ICDE).IEEE,2013:242-253. [17]YAO D,ZHANG C,ZHU Z,et al.Learning deep representation for trajectory clustering[J].Expert Systems,2018,35(2):e12252. [18]ZHENG Y,ZHANG L,XIE X,et al.Mining interesting loca-tions and travel sequences from GPS trajectories[C]//Procee-dings of the 18th International Conference on World Wide Web.2009:791-800. [19]ZHENG Y,XIE X.Learning travel recommendations from user-generated GPS traces[J].ACM Transactions on Intelligent Systems and Technology (TIST),2011,2(1):1-29. [20]ENDO Y,TODA H,NISHIDA K,et al.Classifying spatial tra-jectories using representation learning[J].International Journal of Data Science and Analytics,2016,2(3/4):107-117. [21]JIANG X,DE SOUZA E N,PESARANGHADER A,et al.Tra-jectory Net:An embedded gps trajectory representation for point-based classification using recurrent neural networks[J].arXiv:1705.02636,2017. [22]ANNONI R,FORSTER C H Q.Analysis of aircraft trajectories using fourier descriptors and kernel density estimation[C]//2012 15th International IEEE Conference on Intelligent Transportation Systems.IEEE,2012:1441-1446. [23]SONG Y,CHENG P,MU C.An improved trajectory prediction algorithm based on trajectory data mining for air traffic management[C]//2012 IEEE International Conference on Information and Automation.IEEE,2012:981-986. [24]LIU S S,MA S X,MENG X,et al.Prediction Model of ShipTrajectory Based on CNN and Bi-LSTM[J].Journal of Chongqing University of Technology( Natural Science),2020,34(12):196-205. [25]LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-based lear-ning applied to document recognition[J].Proceedings of the IEEE,1998,86(11):2278-2324. |
[1] | WU Cheng-feng, CAI Li, LI Jin, LIANG Yu. Frequent Pattern Mining of Residents’ Travel Based on Multi-source Location Data [J]. Computer Science, 2021, 48(7): 155-163. |
[2] | CUI Tong-tong, WANG Gui-ling, GAO Jing. Ship Trajectory Classification Method Based on 1DCNN-LSTM [J]. Computer Science, 2020, 47(9): 175-184. |
[3] | LU Xin-yun, WANG Xing-fen. Educational Administration Data Mining of Association Rules Based on Domain Association Redundancy [J]. Computer Science, 2019, 46(6A): 427-430. |
[4] | SUN Wen-ping, CHANG Liang, BIN Chen-zhong, GU Tian-long, SUN Yan-peng. Travel Route Recommendation Based on Knowledge Graph and Frequent Sequence Mining [J]. Computer Science, 2019, 46(2): 56-61. |
[5] | RONG Feng-ping, FANG Yong, ZUO Zheng and LIU Liang. MACSPMD:Malicious API Call Sequential Pattern Mining Based Malware Detection [J]. Computer Science, 2018, 45(5): 131-138. |
[6] | ZHENG Jian-wei, GU Jing-jing and ZHUANG Yi. Pattern Mining of Missing GPS Trajectory Based on Survival Analysis [J]. Computer Science, 2018, 45(5): 185-189. |
[7] | WEI Qin-shuang, WU You-xi, LIU Jing-yu and ZHU Huai-zhong. Distinguishing Sequence Patterns Mining Based on Density and Gap Constraints [J]. Computer Science, 2018, 45(4): 252-256. |
[8] | ZHANG Guang-lan, YANG Qiu-hui, CHENG Xue-mei, JIANG Ke, WANG Shuai, TAN Wu-kun. Application of Sequence Pattern Mining in Communication Network Alarm Prediction [J]. Computer Science, 2018, 45(11A): 535-538. |
[9] | WANG Shu-yi and DONG Dong. Mining of API Usage Pattern Based on Clustering and Partial Order Sequences [J]. Computer Science, 2017, 44(Z6): 486-490. |
[10] | NING Zhuo, SHAO Da-cheng, CHEN Yong and SUN Zhi-xin. Android Static Analysis System Based on Signature and Data Flow Pattern Mining [J]. Computer Science, 2017, 44(Z11): 317-321. |
[11] | CUI Zhan-qi, MU Yong-min, ZHANG Zhi-hua and WANG Wei-guang. Defects Detection Based on Mining Function Call Sequence Patterns [J]. Computer Science, 2017, 44(11): 226-231. |
[12] | LEI Dong, WANG Tao and MA Yun-fei. Frequent Pattern Mining in Bit Stream Based on AC Algorithm [J]. Computer Science, 2017, 44(1): 128-133. |
[13] | DING Jian, HAN Meng and LI Juan. Review of Concept Drift Data Streams Mining Techniques [J]. Computer Science, 2016, 43(12): 24-29. |
[14] | JI Hao-bo and WANG Jun-hong. Research on Improved PrefixSpan Algorithm and its Application in Web User Behavior Patterns Mining [J]. Computer Science, 2016, 43(1): 25-29. |
[15] | WANG Wei, LIU Yuan, ZHANG Chun-rui, WEN Ping and XIE Jia-jun. Detection of Context-based Inconsistencies Bugs [J]. Computer Science, 2015, 42(Z6): 525-530. |
|