首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 437 毫秒
1.
Semantic features are critical intelligence information for mobile ubiquitous multimedia, how to manage and retrieve the semantic information has been an important issue. In this paper, a novel semantic retrieval approach named Data Hiding based Semantic Retrieval (DHSR) for ubiquitous multimedia is proposed. This approach consists of the following features: (1) Every multimedia document has to be semantically annotated by several users before saved into multimedia database. (2) Semantic information described by object ontology will be hidden in the multimedia document data. (3) Semantic information will not be lost even if the multimedia document is copied, cut or leave the database. Our work provides a search engine with convenient user interfaces. The experimental results show that DHSR can search the multimedia documents reflecting users’ query intent more effectively compared with some traditional approaches.  相似文献   

2.
针对LBS查询服务中构造的匿名框或选取的锚点仍位于敏感区域而导致的位置隐私泄漏问题,提出了基于敏感位置多样性的锚点选取算法。该算法根据用户访问数量和访问高峰时段,对不同敏感位置进行定义和筛选,选择具有相似特征的其他敏感位置构成多样性区域,并以该区域形心作为查询锚点,提高用户在敏感位置出现的多样性。以该锚点为查询标志,提出一种均衡增量近邻兴趣点查询算法HINN,在无需用户提供真实位置坐标的条件下实现K近邻兴趣点查询,同时改进了SpaceTwist方法中存在的查询兴趣点围绕锚点分布的缺陷,提高了查询准确度。实验表明,本方法实现了用户在敏感区域停留时的位置隐私保护目标,同时具有良好的兴趣点查询质量和较低的通信开销。  相似文献   

3.
随着网络的快速发展,导致了电子信息源的迅速增长,电子科技信息查询技术也有了新的进展.文中重点论述了扩展查询和查询词重加权技术,包括:①基于用户反馈信息的查询技术;②局部文献分析查询技术;③全局文献分析查询技术.最后指出了未来查询技术的自然语言化、智能化、敏捷化和知识化发展趋势.  相似文献   

4.
A document retrieval system mainly consists of three components: document representation, user queries, and document evaluation. Each component may involve some uncertainties. Fuzzy set theory is a natural approach to coping with the representation of documents, queries, and the relevance of documents to a given query. The authors propose a fuzzy document retrieval model on the World Wide Web (WWW) environment to support conceptual queries. A flexible query expression is proposed to support different semantics of the queries. A concept network is adopted as the knowledge base to represent the relevance of the concepts. The concept network is explored from the WWW. Moreover, they also support neighborhood queries, which retrieve documents relevant to a document specified by a user. A system is currently being implemented to achieve these functions  相似文献   

5.
基于统计机器翻译模型的查询扩展   总被引:1,自引:0,他引:1  
在搜索引擎等实际的信息检索应用中,用户提交的查询请求通常都只包含很少的几个关键词,这会引起相关文档与用户查询之间的词不匹配问题,对检索性能有较严重的负面影响。该文在分析了查询产生模型的基础上,提出了一种新的基于统计机器翻译的查询扩展方法。通过统计机器翻译模型提取文档集中与查询词相关联的词,用以进行查询扩展。在TREC数据集上的试验结果表明:基于统计翻译的查询扩展方法不仅比不扩展的语言模型方法始终有12%~17%的提高,而且比流行的查询扩展方法-伪反馈也具有可比的平均准确率。  相似文献   

6.
针对物理世界的信息查找在过去几年间也受到广泛关注,但是迄今还缺乏深入的研究.目前针对Web信息空间的搜索算法不适合普适空间内的信息查询,原因有二:面向物理实体查询的支撑技术,如嵌入式设备和无线通信,与传统Web信息搜索不同:物理实体相关的信息与Web网页不同,表现在元数据、信息动态性等方面.同时,由于用户查询用词与文档...  相似文献   

7.
合理有效的好友推荐算法对于社交网络的发展和扩张有重大的意义。然而随着社交网络的复杂化和异质化,传统推荐系统中协同过滤推荐方法不能满足需求。针对异质社交网络中存在着大量的内容相关信息这一特点,根据好友推荐的需求,提出了多通道特征融合的好友推荐模型。该模型对用户相关的多维特征进行挖掘与利用,包括显性特征(如用户profile,用户tag,社交关系等)和隐性特征(如用户重要度,挖掘用户标注发现其领域兴趣等),并进一步将这些内容相关的多特征融合到协同排序算法中进行学习训练。实验结果表明,随着多个内容特征的逐步融合,算法的MAP值稳步提高,最终相对未融合的协同排序方法提高了12%,并在一定程度上的解决了冷启动问题,提高了好友推荐的多样性。  相似文献   

8.
在基于位置服务的个性化搜索中,利用可信第三方服务器以及对等节点是保护用户隐私的主要方法,但在现实生活中,它们却是不完全可信的。为了解决这一问题,该文提出一种个性化搜索中基于位置服务的隐私保护方法。该方法通过转换用户的位置信息,并根据用户的查询类型生成用户模型,进而形成带有用户位置信息的查询矩阵,然后利用矩阵加密用户的查询,隐藏查询矩阵中的用户信息,最后根据安全内积计算返回相关性得分最高的前K个查询文件给用户。安全性分析表明该方法能有效地保护用户的查询隐私和位置隐私,通过分析与实验表明,该方法大幅度地缩短了索引构建时间,降低了通信开销,同时为用户提供了基于位置的个性化搜索结果,一定程度上解决了移动设备屏幕小带来的弊端。  相似文献   

9.
Traditional World Wide Web search engines, such as AltaVista.com, index and recommend individual Web pages to assist users in locating relevant documents. As the Web grows, however, the number of matching pages increases at a tremendous rate. Users are often overwhelmed by the large answer set recommended by the search engines. Also, if a matching document is a hypertext, the document structure is destroyed and the individual pages that compose the document are returned instead. The logical starting point of the hyperdocument is thus hidden among the large basket of matching pages. Users need to spend a lot of effort browsing through the pages to locate the starting point, a very time consuming process. This paper studies the anchor point indexing problem. The set of anchor points of a given user query is a small set of key pages from which the larger set of documents that are relevant to the query can be easily reached. The use of anchor points helps solve the problems of huge answer set and low precision suffered by most search engines by considering the hyperlink structures of the relevant documents, and by providing a summary view of the result set.  相似文献   

10.
在对涉密企业信息化调研与文本检索研究的基础上,结合涉密企业信息化的特殊要求与文本检索的优势,提出了将文本检索应用于信息化的系统设计。该系统分为词法语法分析层、核心接口层和存储层3个层次。它能够处理中英文文档并可以扩展到其他语言,支持多种不同的检索方案,提供了一个通用的接口来识别不同的数据源。并依次讨论了该系统中的文档采集、文档对象、查询分析器、用户查询条件匹配及检索接口等模块。  相似文献   

11.
Both human analysts and particularly automated tool suites are capable of deriving sensitive information and conclusions from collections of data items that individually cannot be considered critical or sensitive. This activity of analysing and correlating material that is not immediately related is, in fact, highly desirable in many application areas and cannot be controlled precisely in advance. The decision whether a program or an analyst is performing searches and correlations beyond the scope of his authorisation or current mission can frequently be determined only ex post based on a heuristic analysis of documents accessed. In this paper we describe a mechanism for the instrumentation of operating systems to obtain information on the documents and resources accessed by arbitrary processes. Such a mechanism could be an important component of the infrastructure of an operational risk management system, generating an audit trail for compliance and forensic investigation, and acting as a sensor generating data for analysis. Addressing the latter application, the paper also outlines an approach for extracting textual information and metadata from accessed documents, regardless of the application program and workflow mechanisms used, without unduly impeding either workflows or operator performance. This information can then be subjected to an heuristic analysis based on natural language processing to extract the semantic context of each document or segment. Clustering this content and extracting the conceptual patterns that a user has accessed can then allow abnormal behaviour to be identified. This can then be refined further to determine heuristically whether the authorised remit of the user has been breached and whether an investigation is warranted. We argue that the risk of misbehaviour can be reduced while at the same time increasing productivity. This is made possible by enhancing the degree of freedom for individual users to act in the interest of their mission objectives and at the same time providing automated mechanisms for analysing user behaviour.  相似文献   

12.
黄名选  蒋曹清 《电子学报》2018,46(12):3029-3036
主题漂移和词不匹配是自然语言处理中一个难题,文本挖掘与信息检索的结合有助于解决该问题.鉴于此,本文提出一种基于完全加权正负关联模式挖掘的越-英跨语言查询译后扩展算法.该算法采用新的完全加权正负项集支持度和关联度计算方法以及模式评价框架,对初检用户相关反馈文档集挖掘与原查询词相关的正负关联模式,从模式中提取扩展词实现跨语言查询译后扩展.与现有基于伪相关反馈、加权关联模式挖掘的跨语言扩展算法比较,本文算法能有效地减少查询主题漂移和词不匹配问题,提高跨语言信息检索性能;本文模式挖掘方法可用于推荐系统,提高其准确性.  相似文献   

13.
Current large-scale information sources are designed to support general queries and lack the ability to support scenario-specific information navigation, gathering and presentation. As a result, users are often unable to obtain desired specific information within a well-defined subject area. Today's information systems do not provide efficient content navigation, incremental appropriate matching or content correlation. We are developing the following innovative technologies to remedy these problems: (1) scenario-based proxies, enabling the gathering and filtering of information customized for users within a pre-defined domain; (2) context-sensitive navigation and matching, providing approximate matching and similarity links when an exact match to a user's request is unavailable; (3) content correlation of documents, creating semantic links between documents and information sources; and (4) user models for customizing the retrieved information and the presentation of results. A digital medical library is currently being constructed using these technologies to provide customized information for the user. The technologies are general in nature and can provide custom and scenario-specific information in many other domains (e.g. crisis management)  相似文献   

14.
Weihao LI  Jin CAO  Hui LI 《通信学报》2019,40(5):57-66
The prevalence of mobile intelligent terminals gives the location-based service (LBS) more opportunities to enrich mobile users’ lives.However,mobile users enjoy the convenience with the cost of personal privacy.The side information and mobile user’s recent requirement records were considered,which were obtained or stored by the service provider.Based on the existence of recent requirement records,adversary can employ the inference attack to analysis mobile user’s personal information.Therefore,two schemes were proposed,including of basic privacy self-correlation privacy-preserving scheme (Ba-2PS) and enhanced privacy self-correlation privacy-preserving scheme(En-2PS).In En-2PS,the privacy-preserving scheme was designed from two dimensions of aspects of time factor and query region,which increased the uncertainty inferring out the real information.Finally,the privacy analysis was illustrated to proof En-2PS’s privacy degree,then the performance and privacy evaluation results indicate that En-2PS is effective and efficient.  相似文献   

15.
本文以中国移动为例,由介绍各省公司公文系统的现状和集中化背景入手,说明公文集中化系统建设的必要性。文中详细介绍中国移动公文集中化业务、技术两方面的建设思路,最后重点介绍了建设思路中的公文业务支撑模式、VIP用户服务保障方案、公文应用动态部署与扩展、高可用容灾技术和国产化等多方面来探讨公文集中化的可行性方案。  相似文献   

16.
针对用户在获得位置服务的同时,用户的位置隐私可能会被泄露的问题,采用协作的分布式模型,移动终端和LBS服务器这两端都使用k-匿名机制,提出基于k-匿名的均衡增量近邻(KHINN)查询方法。该方法在移动终端构造匿名用户组时,利用安全多方求和的技术计算锚点以保证用户隐私;在处理查询结果时,使用基于k-匿名的SpaceTwist方法提高查询隐私度和准确度。经过性能分析和实验结果表明,在考虑用户节点之间半可信或不可信的情况下,可以解决SpaceTwist方法中的查询兴趣点围绕锚点分布不均衡的缺陷问题,提高查询准确度。  相似文献   

17.
Skyline查询能够计算大规模的数据集中满足多个标准的最优解,被广泛应用于多目标决策等领域.动态skyline查询作为skyline查询的一种重要变体,其结果随着查询点的不同而动态改变,为用户在指定查询要求方面提供了更大的灵活性.然而,随着数据量的不断增加,动态skyline查询会产生大量的查询结果,忽略了查询点的维度方向性和数据的全局整体性,给用户的选择带来极大困难.因此,需要进一步优化动态skyline查询的结果集,提高全局整体性,过滤冗余数据.针对上述问题,提出一种基于MapReduce的增广动态skyline查询处理方法.该方法将原始数据按照维度信息进行分区,在多个节点并行计算动态skyline,优化传统动态skyline结果集,同时提供全局更优的结果供用户选择.在此基础上,针对用户给出某些维度的容忍度的情况,提出一种引入用户容忍度的增广动态skyline查询处理方法.该方法可以根据用户容忍度缩减增广动态skyline查询的原始数据集,很大程度上减少中间结果的比较次数,并且提高了结果集的准确度.大量实验证明,基于MapReduce的增广动态skyline查询处理方法具有更好的有效性、准确性和可用性.  相似文献   

18.
Analysis of a customer’s sensibility preferences is an important strategy in a market that is becoming increasingly more customer-oriented. In this paper, the interactive design recommendation using the sensor based smart wear and the weather WebBot (DRS-WB) is proposed. The proposed method is increasing the efficiency of merchandising for human-oriented sensibility product designs. Development of the DRS-WB included a user interface and collaborative filtering of textile and fashion designs to satisfy the user’s needs. Collaborative filtering is used to recommend designs of interest for users based on predictive relationships discovered between the current user and other previous users. Current weather information is simultaneously acquired from the sensor based smart wear and the weather WebBot. The sensor based smart wear is fabricated as a way of non-tight and comfortable style fitting for the curves of the human body based on clothes to wear in daily life. The design sample of the smart wear uses basic stretch materials and is designed to sustain its wearable property. The weather WebBot uses a database of weather forecast information extracted from the Web pages and RSS (Really Simple Syndication) feed of the Korea Meteorological Administration and collects information from the various links off the main URL. Information is stored in a database using XML query for collecting effective weather data and processed as a form of XML through extracting and exchanging the information. These signals are then transmitted to the connected DRS-WB. This information can be easily monitored in real time. Textile designs and fashion designs were incorporated into the survey. Pictures of fashion design details such as collar type, sleeve type, skirt type, skirt length, and color tone were evaluated in terms of sensibility. Finally, this paper suggests empirical applications to verify the adequacy and validity of this system.  相似文献   

19.
Search engine plays an irreplaceable role in web information organizing and accessing. It is very common for Internet users to query a search engine when retrieving web information. Sensitive data about search engine user’s intentions or behavior can be inferred from his query phrases, the returned results pages, and the webpages he visits subsequently. In order to protect contents of communications from being eavesdropped, some search engines adopt HTTPS by default to provide bidirectional encryption. This only provides an encrypted channel between user and search engine, the majority of webpages indexed in search engines’ results pages are still on HTTP enabled websites and the contents of these webpages can be observed by attackers once the user click on these links. Imitating attackers, we propose a novel approach for attacking secure search through correlating analysis of encrypted search with unencrypted webpages. We show that a simple weighted TF–DF mechanism is sufficient for selecting guessing phrase candidates. Imitating search engine users, by querying these candidates and enumerating webpages indexed in results pages, we can hit the definite query phrases and meanwhile reconstruct user’s web-surfing trails through DNS-based URLs comparison and flow feature statistics-based network traffic analysis. In the experiment including 28 search phrases, we achieved 67.86% hit rate at first guess and 96.43% hit rate within three guesses. Our empirical research shows that HTTPS traffic can be correlated and de-anonymized through HTTP traffic and secured search of search engines are not always secure unless HTTPS by default enabled everywhere.  相似文献   

20.
I. Introduction Most of current Information Retrieval (IR) sys-tems try to match terms of queries with terms of documents. One major problem of these approaches lies in that users want to retrieve documents accord-ing to content, while individual words provide unre-liable evidence about the content of the texts[1?3]. When some parts of text in the document collection are missing, e.g. only the abstract is available, the word-use variability problem will have substantial impact on the IR per…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号