Multiple Trips Pattern Mining
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
In recent years, photograph sharing is one of the most mainstream web service, for example, Flickr, trip advisor and numerous other web services. The photograph sharing web services give capacities to include Geo coordinates, tags, and user ID to photographs to make photograph organizing easily. This study focuses on Geotagged photographs and discusses an approach to recognize user multiple trips pattern, i.e., common arrangements of visits in towns and span of stay and also elucidating labels that describe the multiple trips pattern. First, we segment collection of photos into multiple trips and categorize the photos manually based on photo trips into multiple trips, themes such as Landmark, Nature, Business, Neutral and Event. Our method mines multiple trips pattern for multiple trips theme categories. The experimental result of our technique beats other methods and accurate segmentation of photo collections into numerous trips with the 85% of accuracy. The multiple trips categorize about 91% correctly using tags, photo id, titles of digital photos, user id and visited cities as features. In last, we demonstrate the motivating examples showing an application with which one can find multiple trips pattern from our datasets and other different queries visit duration, destination and multiple trips’ theme on trips.
Authors and Affiliations
Riaz Ahmed Shaikh, Kamelsh Kumar, Rafaqat Hussain Arain, Hidayatullah Shaikh, Imran Memon, Safdar Ali Shah
Fuzzy-Semantic Similarity for Automatic Multilingual Plagiarism Detection
A word may have multiple meanings or senses, it could be modeled by considering that words in a sentence have a fuzzy set that contains words with similar meaning, which make detecting plagiarism a hard task especially w...
Data Security Using Cryptography and Steganography Techniques
Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission...
Survey and Classification of Methods for Building a Semantic Annotation
Though Arabic is one of the five most spoken languages, little work has been done on building Arabic semantic resources. Currently, there is no agreed-upon method for building such a reliable Arabic semantic resource. Th...
Complexity of Network Design for Private Communication and the P-vs-NP Question
We investigate infeasibility issues arising along network design for information-theoretically secure cryptography. In particular, we consider the problem of communication in perfect privacy and formally relate it to gra...
Finger Vein Recognition using Straight Line Approximation based on Ensemble Learning
Human identity recognition and protection of information security are current global concerns in this age of increasing information growth. Biometrics approach of defining identity is considered as one of the highly pote...