期刊文献+

基于等距加密和案例推理的旅游线路聚类算法 被引量:2

Tour route clustering algorithm based on isometric encryption and case reasoning
下载PDF
导出
摘要 提出了基于等距加密(IE)和案例推理(CR)的旅游线路聚类算法,首先对旅游者的敏感属性进行随机等距旋转变换,再对变化后的数据集使用案例推理方法进行旅游线路的聚类分析。该方法可以保持点集中两点间的距离不变,从而对变换前和变换后的数据集进行案例推理,寻求最近邻点得到的结果是一致的;并且提出的旋转变换是随机的,可以经受攻击而不容易被攻破,很好地保护旅游者的敏感信息。实验结果表明,该算法既能保护用户的敏感信息,又能给旅游者推荐合适的旅游线路。 This paper presents tour route clustering algorithm based on Isometric Encryption(IE) and Case Reasoning(CR).It firstly processes the tourists'sensitive attribution using random isometric rotation transformation,then uses case reasoning to analyze the tour route on transformed dataset.The presented rotation transformation can keep the distance between two points invariable.So the nearest points that are found using case reasoning on two different datasets are same.And the rotation transformation is random,which is not easily be breached.The experiment shows that this method can protect tourists'sensitive information,and give the appropriate tour route.
作者 吕威 倪玉华
出处 《计算机工程与应用》 CSCD 北大核心 2010年第11期223-225,239,共4页 Computer Engineering and Applications
基金 珠海市科技计划项目(No.PC20061008)
关键词 旋转变化 等距 案例推理 敏感信息 旅游线路 聚类 rotation transformation isometric case reasoning sensitive information tour circuit clustering
  • 相关文献

参考文献13

  • 1Campbell C K.An approach to research in recreational geography[M].British Columbia:Department of Geography,University of British Columbia,1967. 被引量:1
  • 2Stewart S I,Vogt C A.Multi-destination trip patterns[J].Annals of Tourism Research,1997,24(2):458-461. 被引量:1
  • 3Lundgren J O J.The development of tourist travel system:A metropolitan economic hegemony par excellence[M]Jahrgang:Jahrbuch fur Fremdenverkegr,1972. 被引量:1
  • 4冯爱芬.最佳旅游线路的设计与算法[C].第二届中国智能计算大会论文.洛阳,2008(8):23-27. 被引量:4
  • 5Watson I,Marir F.Case-based reasoning:A review[J].Knowledge Engineering Review,1994,9(4):355-381. 被引量:1
  • 6VeryKios V S,Bertino E,Nai Fovino I.State-of-the-art in privacy-preserving data mining[J].SIGMOD Record,2004,33(1). 被引量:1
  • 7Oleveira S R M.Zaiane 0 R.Protecting sensitive knowledge by da-ta sanitization[C]//Proceedings of the 3rd IEEE International Conference on Data Mining,2003. 被引量:1
  • 8Pinkas B.Cryptographic techniques for privacy-preserving data mining[J].SIGKDD Explorations,2004,4(2). 被引量:1
  • 9Evfimievski A,Srikant R,Agrawal R,et al.Privacy preserving mining of association rules[C]//Proc of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.[S.I.]:ACM Press,2002:217-228. 被引量:1
  • 10Rizvi S J,Haritsa J R.Maintaining data privacy in association rule mining[C]//Proceedings of 28th International Conference on Very Large Data Bases,Hong Kong,China,August 2002. 被引量:1

共引文献3

同被引文献4

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部