Please wait a minute...
Journal of ZheJiang University (Engineering Science)  2022, Vol. 56 Issue (2): 280-287    DOI: 10.3785/j.issn.1008-973X.2022.02.008
    
Loose infection pattern mining algorithms over moving objects
Yu CHEN1(),Hua DAI1,2,*(),Bo-han LI3,Geng YANG1,2
1. School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2. Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing 210023, China
3. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
Download: HTML     PDF(696KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

The definition of infection pattern of viruses or germ in the existing research schemes is so strict that important and correct infection events may be missed. Thus, a loose infection pattern mining algorithm oriented to moving objects was proposed. Loose infection model was defined and loose infection pattern mining algorithm (LIPMA), which used a sliding window mechanism, was proposed. According to the time sequence of the occurrence of infectious events, LIPMA uses the sliding window mechanism to analyze and process each object to be detected in turn, thereby mining all infectious events. On this basis, an optimized mining algorithm LIPMA+ based on R-tree was proposed. The optimized algorithm reduces the size of the object to be detected in each round of processing to improve the mining efficiency. Experimental results show that the proposed infection pattern mining algorithm can efficiently and accurately mine loose infectious events, and can mine more potential infectious events. The mining efficiency of the optimized algorithm was significantly improved, and the average mining time of LIPMA+ only accounted for 2% of that of LIPMA.



Key wordsmoving object      data mining      infection pattern      geospatial data      R-tree     
Received: 13 July 2021      Published: 03 March 2022
CLC:  TP 399  
Corresponding Authors: Hua DAI     E-mail: 1348987670@qq.com;daihua@njupt.edu.cn
Cite this article:

Yu CHEN,Hua DAI,Bo-han LI,Geng YANG. Loose infection pattern mining algorithms over moving objects. Journal of ZheJiang University (Engineering Science), 2022, 56(2): 280-287.

URL:

https://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2022.02.008     OR     https://www.zjujournals.com/eng/Y2022/V56/I2/280


面向移动对象的松散型传染模式挖掘方法

针对现有研究方案中对病毒或病菌的传染模式定义过于严格,可能丢失重要且正确的传染事件的问题,提出面向移动对象的松散型传染模式挖掘算法. 给出松散型传染事件的模式定义;提出基于滑动窗口的松散型传染模式挖掘算法(LIPMA),按照传染事件发生的时间先后顺序,从初始传染源开始,利用滑动窗口机制,依次对每一个待检测对象进行分析处理,进而挖掘所有传染事件;提出基于R-tree索引的优化挖掘算法LIPMA+,该优化算法在每一轮的处理过程中,通过降低每一轮待检测对象的规模,实现挖掘效率的提升. 实验结果表明,所提出的传染模式挖掘算法能够对松散型传染事件进行高效、正确的挖掘,且能够挖掘更多潜在的传染事件;优化算法的挖掘效率显著提升,LIPMA+的平均挖掘时间仅占LIPMA的2%.


关键词: 移动对象,  数据挖掘,  传染模式,  地理空间数据,  R树 
Fig.1 Infection mode based on trajectory
Fig.2 Schematic diagram of infection mode
Fig.3 Trend of number of loose infection events
Fig.4 Trend of mined time
[1]   MORITA T, TOYODA A, AISU S, et al Animals exhibit consistent individual differences in their movement: a case study on location trajectories of Japanese macaques[J]. Ecological Informatics, 2020, 56: 101057
doi: 10.1016/j.ecoinf.2020.101057
[2]   KANG J, YU R, HUANG X, et al Blockchain for secure and efficient data sharing in vehicular edge computing and networks[J]. IEEE Internet of Things Journal, 2019, 6 (3): 4660- 4670
doi: 10.1109/JIOT.2018.2875542
[3]   GUO L, ZHANG D X, CONG G, et al Influence maximization in trajectory databases[J]. IEEE Transactions on Knowledge and Data Engineering, 2016, 29 (3): 627- 641
[4]   杜金姬, 秦闯亮 一类具有logistic增长的随机SIRS传染病模型的平稳分布和灭绝性[J]. 高师理科学刊, 2020, 40 (10): 13- 17
DU Jin-ji, QIN Chuang-liang Stationary distribution and extinction of a stochastic SIRS epidemic model with logistic growth[J]. Journal of Science of Teachers’ College and University, 2020, 40 (10): 13- 17
doi: 10.3969/j.issn.1007-9831.2020.10.004
[5]   LAUBE P. Computational movement analysis[M]. Switzer land: Springer, 2014.
[6]   LIU W, GAO Z J A distributed flocking control strategy for UAV groups[J]. Computer Communications, 2020, 153: 95- 101
doi: 10.1016/j.comcom.2020.01.076
[7]   JEUNG H Y, YIU M L, ZHOU X F, et al Discovery of convoys in trajectory databases[J]. Proceedings of the VLDB Endowment, 2008, 1 (1): 1068- 1080
doi: 10.14778/1453856.1453971
[8]   ORAKZAI F, CALDERS T, PEDERSEN T B k/2-hop: fast mining of convoy patterns with effective pruning[J]. Proceedings of the VLDB Endowment, 2019, 12 (9): 948- 960
doi: 10.14778/3329772.3329773
[9]   SADEGHNEJAD-BARKOUSARAIE A, BATTA R, SUDIT M Convoy movement problem: a civilian perspective[J]. Journal of the Operational Research Society, 2016, 68: 1- 20
[10]   LI Z H, DING B, HAN J W, et al Swarm: mining relaxed temporal moving object clusters[J]. Proceedings of the VLDB Endowment, 2010, 3 (1/2): 723- 734
[11]   HOUSSEIN E H, AHMED M M, ELAZIZ M A, et al Solving multi-objective problems using bird swarm algorithm[J]. IEEE Access, 2021, 9: 36382- 36398
doi: 10.1109/ACCESS.2021.3063218
[12]   WANG X B, LIUC, ZHU M L. Instant traveling companion discovery based on traffic-monitoring streaming data [C]// 2016 13th Web Information Systems and Applications Conference. Wuhan: IEEE, 2016: 89-94.
[13]   CHAO F, HE Z Q, FENG R K, et al Predictive trajectory-based mobile data gathering scheme for wireless sensor networks[J]. Complexity, 2021, (2): 3941074
[14]   SONG X Y, SUN W, ZHANG Q L A dynamic hierarchical clustering data gathering algorithm based on multiple criteria decision making for 3D underwater sensor networks[J]. Complexity, 2020, 8835103
[15]   NASERIAN E, WANG X H, XU X L, et al A framework of loose travelling companion discovery from human trajectories[J]. IEEE Transactions on Mobile Computing, 2018, 17 (11): 2497- 2511
doi: 10.1109/TMC.2018.2813369
[16]   XU J Q, LU H, BAO Z F IMO: a toolbox for simulating and querying “infected” moving objects[J]. Proceedings of the VLDB Endowment, 2020, 13 (12): 2825- 2828
doi: 10.14778/3415478.3415485
[17]   GUTTMAN A. R-trees: a dynamic index structure for spatial searching[C]// Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data. Boston: ACM, 1984, 14(2): 47-57.
[18]   YUAN J, ZHENG Y, XIE X, et al. Driving with knowledge from the physical world[C]// Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. California: ACM, 2011: 316-324.
[1] Gen LI,Wei ZHAI,Lan WU. Study of merging interactions based on gradient boosting decision tree[J]. Journal of ZheJiang University (Engineering Science), 2022, 56(4): 649-655.
[2] Xin-yue LI,Shu-qin CHEN,Hong-liang LI,Yun-xiao LOU,Jia-he LI. Analysis of air-conditioning usage and energy consumption in campus teaching buildings with data mining[J]. Journal of ZheJiang University (Engineering Science), 2020, 54(9): 1677-1689.
[3] QI Jian-peng, YU Yan-wei, WANG Chuang-cun, CAO Lei, SONG Peng. Multi-threading based continuous k-nearest neighbor queries for uncertain moving objects[J]. Journal of ZheJiang University (Engineering Science), 2018, 52(1): 142-150.
[4] WANG Cheng-long, LI Cheng, FENG Yi-ping, RONG Gang. Dispatching rule extraction method for job shop scheduling problem[J]. Journal of ZheJiang University (Engineering Science), 2015, 49(3): 421-429.
[5] HU Zhu-hua, ZHAO Yao-chi, CHENG Jie-ren, PENG Jin-lian. Moving object segmentation method based on improved DRLSE[J]. Journal of ZheJiang University (Engineering Science), 2014, 48(8): 1488-1495.
[6] CHEN Nan, SHOU Li-dan, CHEN Gang, CHEN Ke, HU Tian-lei. elf-tuning indexing of moving objects for dynamic environment[J]. Journal of ZheJiang University (Engineering Science), 2013, 47(3): 442-448.
[7] WANG Xiang-bing,TONG Shui-guang,ZHONG Wei,ZHANG Jian. Study on scheme design technique for hydraulic excavator's structure performance based on extension reuse[J]. Journal of ZheJiang University (Engineering Science), 2013, 47(11): 1992-2002.
[8] MA Jin, Li-Feng, LI Jian-Hua. Perturbation method for distributed privacy-preserving data mining[J]. Journal of ZheJiang University (Engineering Science), 2010, 44(2): 276-282.
[9] DAN Fu-Dong, CA Ming, TUN Hong-Sen, DONG Jin-Xiang, FU Gao. An incremental algorithm for mining frequent closed patterns[J]. Journal of ZheJiang University (Engineering Science), 2009, 43(8): 1389-1395.
[10] WANG Guang-Ceng, CAO Yi-Jia, CU Jun, et al. Design and implementation of general report integrated management system for power company[J]. Journal of ZheJiang University (Engineering Science), 2009, 43(11): 2062-2066.