Multiple Trips Pattern Mining
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
In recent years, photograph sharing is one of the most mainstream web service, for example, Flickr, trip advisor and numerous other web services. The photograph sharing web services give capacities to include Geo coordinates, tags, and user ID to photographs to make photograph organizing easily. This study focuses on Geotagged photographs and discusses an approach to recognize user multiple trips pattern, i.e., common arrangements of visits in towns and span of stay and also elucidating labels that describe the multiple trips pattern. First, we segment collection of photos into multiple trips and categorize the photos manually based on photo trips into multiple trips, themes such as Landmark, Nature, Business, Neutral and Event. Our method mines multiple trips pattern for multiple trips theme categories. The experimental result of our technique beats other methods and accurate segmentation of photo collections into numerous trips with the 85% of accuracy. The multiple trips categorize about 91% correctly using tags, photo id, titles of digital photos, user id and visited cities as features. In last, we demonstrate the motivating examples showing an application with which one can find multiple trips pattern from our datasets and other different queries visit duration, destination and multiple trips’ theme on trips.
Authors and Affiliations
Riaz Ahmed Shaikh, Kamelsh Kumar, Rafaqat Hussain Arain, Hidayatullah Shaikh, Imran Memon, Safdar Ali Shah
Developing Computer Network Based on EIGRP Performance Comparison and OSPF
One of the computer network systems technologies that are growing rapidly at this time is internet. In building the networks, a routing mechanism is needed to integrate the entire computer with a high degree of flexibili...
OPTIMIZING THE USE OF AN SPI FLASH PROM IN MICROBLAZE-BASED EMBEDDED SYSTEMS
This paper aims to simplify FPGA designs that incorporate Embedded Software Systems using a soft core Processor. It describes a simple solution to reduce the need of multiple non-volatile memory devices by using one SPI...
A New Steganography Technique using JPEG Images
Steganography is a form of security technique that using ambiguity to hide a secret message within an ordinary message between senders and receivers. In this paper, we propose a new steganography technique for hiding dat...
Gaze Direction based Mobile Application for Quadriplegia Wheelchair Control System
People with quadriplegia recruit the interest of researchers in introducing automated movement systems for adopted special purpose wheelchairs. These systems were introduced for easing the movement of such type of disabl...
Storage Consumption Reduction using Improved Inverted Indexing for Similarity Search on LINGO Profiles
Millions of compounds which exist in huge datasets are represented using Simplified Molecular-Input Line- Entry System (SMILES) representation. Fragmenting SMILES strings into overlapping substrings of a defined size cal...