CN104954986B - A kind of opportunistic data transmission method based on more behavior places - Google Patents
A kind of opportunistic data transmission method based on more behavior places Download PDFInfo
- Publication number
- CN104954986B CN104954986B CN201510307475.XA CN201510307475A CN104954986B CN 104954986 B CN104954986 B CN 104954986B CN 201510307475 A CN201510307475 A CN 201510307475A CN 104954986 B CN104954986 B CN 104954986B
- Authority
- CN
- China
- Prior art keywords
- user
- mrow
- behavior
- place
- msub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention proposes a kind of opportunistic data transmission method based on more behavior places, to solve that more behavior site attribute users can not be sent data to exactly.User carries out place behavior registration to Cloud Server first, and Cloud Server preserves user/behavior place confederate matrix, and server immediate updating matrix simultaneously returns to newest timeslice vector to user.Source user is to starting data forwarding process after Cloud Server request for data.In data forwarding process, initiating line first posts messages tohIndividual different behavior site attribute users, whereinhFor place quantity.Forwarding enters gradient incremental stages, and message is successively forwarded to each behavior place and is intended to recipient.The intention recipient in all behavior places around is finally sent the data in a manner of multicast.Using user behavior attribute weights as forwarding condition, more behavior site users are forwarded the data to, data transmission rate is effectively increased, reduces energy consumption.
Description
Technical field
The present invention proposes a kind of opportunistic data transmission method based on more behavior places, belongs to opportunistic network and social activity
The crossing domain of network.
Background technology
At present, traditional sensor network comes with some shortcomings:(1) need manually to dispose substantial amounts of awareness apparatus in advance,
Not only expensive, with the expansion of scale, the complexity of system also sharply increases.(2) the static deployment of awareness apparatus, typically not
Meeting dense deployment so that perception visual angle is single, can not comprehensive thorough perceptive object.(3) data are forwarded according to node ID, no
It is adapted to the network scenarios of highly dynamic movement, can not be also applied to the network that special interests preference be present.
With the development of technology, the intelligent movable equipment with abundant sensor emerges in multitude, and intelligent perception is as next
For cognition technology, have become study hotspot in recent years.Major product of the smart mobile phone as mobile device, can be true
Ground reflects the behavior property of holder, and opportunities and challenges are brought for intelligent perception technology.The high-performance mobile to spread all over the world
Equipment has erected huge community network, and mobile subscriber can obtain in community network, sharing data, pass through the receipts to data
Integrating, analyzing is the customized privatization service of user so that intelligent perception technology generates good application value.
Intelligent perception by carry the individual of awareness apparatus shared by mobile Internet or obtained data carry out it is conscious,
Unconsciously cooperate to complete the social perception task of complexity.Intelligent perception technology is entered by the mobile terminal device largely popularized
Row perception activity, the problem of overcoming awareness apparatus costliness, perception data in all directions can be carried out using the mobile wisdom of people.
By analyzing the social of user, the data-collecting mode that guide is characterized as with user behavior is established, improves user's participation
With Data Collection performance.
A big key technology of the Data Collection as intelligent perception, based on social action analysis opportunistic Data Collection into
For the main way of intelligent perception Data Collection.However, opportunistic data collection techniques still face some technical barriers at present:
(1) used by mobile subscriber there is limitation in embedded device its calculating, storage capacity and battery power.(2) it is social
It is the primary feature that intelligent perception is different from other data perception patterns, how extracts the social property of people and be quantified as calculating
Unit be urgent problem to be solved.(3) under in general network condition, sensing node interaction data information only when meeting,
Data exchange chance is very valuable, reduces time delay, improves efficiency of transmission as another challenge in opportunistic Data Collection.
The content of the invention
Present invention aim to address in being applied in intelligent perception how by data opportunistic forwarding by way of it is accurate
Sending extremely has the problem of more behavior properties user groups.The present invention calculates use by portraying BM25 models according to user property
Similarity weights of the family on specific behavior place, and sent data to according to these weights with more behavior properties users,
The quantity of message copy in data transmission procedure is optimized, relative to other similar data collection algorithms, this method has low
Cost, high transmission rates characteristic.
The problem of Data Transport Protocol that the invention is directed in existing intelligent perception application only considers single act attribute, is utilized
The stability of user behavior, using server/user model, user behavior attribute is extracted by server, and by BM25 models
User behavior attribute is portrayed, user/behavior place confederate matrix is formed and is stored among server, server uploads according to user
Behavioural information immediate updating confederate matrix, it is ensured that real-time, the accuracy of data.Whenever source user needs to send information to
During targeted customer, source user need to ask for global information to server, and data are sent by source user opportunistic, and user data is hidden
Private is guaranteed.It is incremented by data transmission phase using ladder by the way of multicast is combined, effectively reduces message copy number
Amount, reduce and send energy consumption.Comparison according to the correlation weights between user on behavior place carries out data forwarding, improves
Data transmission success.
The present invention technical solution be:
The invention provides a kind of opportunistic data transmission method based on more behavior places.Cloud Server is built, is passed through
BM25 portrays user property formation user/behavior place confederate matrix and is stored in server.Source user to server request for data,
And opportunistic data forwarding is carried out on the similarity weights of appointed place according to user.
Explanation of nouns:
Timeslice tsij:The time that user i is consumed in behavior place j;
User's mean activity timeslice number utsi:The averagely daily activity time piece quantity of user;
All user's mean activity timeslice number avts:The averagely daily activity time piece quantity of all users;
Duration regulation attribute E:For balancing Active duration between all users and unique user;
Behavior property BeAij:Correlations of the user i on behavior place j;
Place balanced nature BAj:The activity venue factor more and less for balancing flow of the people, reflection people's behavior place
Distribution situation in all users;
Behavior place weight w eightij:User i is to behavior place j correlation weights;
Behavior place threshold values thj:Behavior place j borders weights, user's i behaviors place weight w eightij≥thjWhen, recognize
For the Interests User that user i is behavior place j.
Specific steps:
Step 1:If number of users is n, place quantity is m, and user i ∈ { 1 ..., n } are in behavior place j ∈ { 1 ..., m }
The time of consumption is with timeslice quantity (time slice) tsijMeasurement.The length (length of time slice) of timeslice
Tl is fixed as, if user i is T in the behavior place j total times consumedij, then tsij=Tij/tl。tsijReflection behavior place j
To user i correlation, timeslice quantity is bigger, and user is more related to the place.Each user i periodically submits to server to close
The time T that j is consumed in placeij, referred to as behavior place is registered;
Step 2:The mobile trajectory data that server is submitted according to user i, times of the counting user i to certain behavior place
Piece vector T Si=(tsi1,tsi2,…tsim), and result of calculation is stored in service in the form of user/behavior place confederate matrix
Device end.The user couple in user/behavior place confederate matrix is updated when server receives user i track data every time immediately
The information answered, and will statistics gained timeslice vector T SiIt is sent to user.Wherein user/behavior place confederate matrix form is such as
Shown in table 1:
Table 1:User/behavior place confederate matrix
Behavior place 1 | Behavior place 2 | Behavior place 3 | Behavior place 4 | |
User 1 | Timeslice ts11 | Timeslice ts12 | Timeslice ts13 | Timeslice ts14 |
User 2 | Timeslice ts21 | Timeslice ts22 | Timeslice ts23 | Timeslice ts24 |
User 3 | Timeslice ts31 | Timeslice ts32 | Timeslice ts33 | Timeslice ts34 |
User 4 | Timeslice ts41 | Timeslice ts42 | Timeslice ts43 | Timeslice ts44 |
Step 3:Source user s specifies TBP=((p1,th1),(p2,th2),…,(ph,thh)), h≤m, wherein pjAnd thj, j
∈ 1 ..., and h } it is respectively behavior place and corresponding behavior place threshold values;S sends behavior place vector P to server;
Step 4:Server calculates all user's mean activity timeslice number avts, and is sent to source user s.Wherein user
Mean activity timeslice number avts computational methods are:
Step 5:Server calculates all place balanced nature vector BA (wherein according to user/behavior place confederate matrix
Place balanced nature BA corresponding to all behavior places that BA vectors are specified for source userjSet), and send to source user s.
Wherein, place j ∈ { 1 ..., h } place balanced nature BAjComputational methods be:
pvjThe total number of persons (flow of the people) averagely accessed daily for behavior place j, i.e., jth row are not 0 in confederate matrix
Number.BAjAs global factor, consideration be behavior place j relative importance.Understood according to formula (2), given area personnel
Sum, more people reached this place, then the value of balance factor will be smaller.What balance factor reflected is interested site in institute
There is the distribution situation in personnel, the final behavior weights in the less but important behavior place of flow of the people are balanced with this.
Step 6:User's mean activity timeslice number avts and place balanced nature vector BA is sent to by source user s
Each user r that meets, calculates each weight w eight on place j ∈ { 1 ..., h }sjAnd weightrj;Behavior place weights
Computational methods are as follows:
Calculate Active duration regulation attribute Ei:
Wherein utsiRepresent that user i consumes activity time piece sum daily,Duration adjusts attribute
Represent considerations of the user i to timeslice sum.k1, b is empirical parameter.B is used to adjust user's i timeslice ratios, value model
Enclose for [0,1].When b values are 0 the complete time will be used in representation formula when b values are 1 without using timeslice ratio
Piece ratio
Calculating behavior factor B eAij:
BeAijUser i is represented to behavior place j degree of correlation, its value is higher, illustrates that user i is more related to place j.
User i is for the computational methods of behavior place j weights:
weightij=BeAij·BAj (5)
Step:7:Into the initiating line stage, if weightrj≥weightsjIf the user is rj, then source user
Forward the data to rj, otherwise do not forward;
Step 8:Repeat step:6-step 7, until all h behavior places all search out all corresponding all rj;
Step 9:Source user s deletes the data of itself preservation, and now source user is initialized the incremental route of h bars;
Step:10:User r on every circuitjInquire weights of the user q each run on behavior place j
Weightqj;
Step 11:Into gradient incremental stages, if weightqj≥weightrjj, then rjForward the data to q, rjDelete
Except data;Otherwise do not forward;
Step:12:10-step 11 of repeat step, until weightqj≥thj;
Step:13:Into the multicast stage, in data lifetime, meet weight for any user qqj≥thjIf
Meet any user t to meetThen user q copies data to user t, terminates.
Beneficial effect
The present invention is solved in intelligent perception application on more behavior place opportunistic data transmission problems.Through being put down in ONE
The checking of platform the simulation experiment result knows there is the advantages of following notable relative to traditional single act place opportunistic transmission plan:
1. by portraying more behavior properties of user, data forwarding foundation of the using weights as more behavior places, energy
It is enough effectively to transfer data in the customer group with more behavior properties, improve transfer rate and data send it is accurate
Rate.
2. employing the data transfer mode that gradient is incremented by and multicast is combined in data-gathering process, effectively reduce
Data trnascription quantity in repeating process, reduce transmission energy consumption.
Brief description of the drawings
Opportunistic data transmission method flow charts of the Fig. 1 based on more behavior places.
Fig. 2 user/cloud platform interaction models.
Fig. 3 user/behavior place confederate matrix.
The more behavior locality data transmission method schematic diagrames of Fig. 4.
Embodiment
Embodiments of the present invention are introduced below in conjunction with accompanying drawing.
The present invention provides a kind of opportunistic data transmission method based on more behavior places, and this method is to the more of mobile subscriber
Behavior property is portrayed, and data forwarding foundation of the using weights as more behavior places, can effectively be transferred data to
In customer group with more behavior properties.The specific implementation flow of this method is as shown in Figure 1.This method needs Cloud Server branch
Hold, to store calculating user data, and carry out real time data interworking.User/cloud platform interaction models are as shown in Figure 2.
Specific implementation step is:
Step 1:If number of users is n, place quantity is m, and user i ∈ { 1 ..., n } are in behavior place j ∈ { 1 ..., m }
The time of consumption is with timeslice quantity (time slice) tsijMeasurement.The length (length of time slice) of timeslice
Tl is fixed as, if user i is T in the behavior place j total times consumedij, then tsij=Tij/tl。tsijReflection behavior place j
To user i correlation, timeslice quantity is bigger, and user is more related to the place.Each user i periodically submits to server to close
The time T that j is consumed in placeij, referred to as behavior place is registered;
Step 2:The mobile trajectory data that server is submitted according to user i, times of the counting user i to certain behavior place
Piece vector T Si=(tsi1,tsi2,…tsim), and result of calculation is stored in service in the form of user/behavior place confederate matrix
Device end.User/behavior place confederate matrix is as shown in Figure 3.Server updates immediately when receiving user i track data every time
Information corresponding to the user in user/behavior place confederate matrix, and will statistics gained timeslice vector T SiIt is sent to user;
Step 3:Source user s specifies TBP=((p1,th1),(p2,th2),…,(ph,thh)), h≤m, wherein pjAnd thj, j
∈ 1 ..., and h } it is respectively behavior place and corresponding behavior place threshold values;S sends behavior place vector P to server;
Step 4:Server calculates all user's mean activity timeslice number avts, and is sent to source user s.Wherein user
Mean activity timeslice number avts computational methods are:
Step 5:Server calculates all place balanced nature vector BA (wherein according to user/behavior place confederate matrix
Place balanced nature BA corresponding to all behavior places that BA vectors are specified for source userjSet), and send to source user s.
Wherein, place j ∈ { 1 ..., h } place balanced nature BAjComputational methods be:
pvjThe total number of persons (flow of the people) averagely accessed daily for behavior place j, i.e., jth row are not 0 in confederate matrix
Number.BAjAs global factor, consideration be behavior place j relative importance.Understood according to formula (2), given area personnel
Sum, more people reached this place, then the value of balance factor will be smaller.What balance factor reflected is interested site in institute
There is the distribution situation in personnel, the final behavior weights in the less but important behavior place of flow of the people are balanced with this.
Following step 6-step 12 is data transfer phase, and process is as shown in Figure 4.
Step 6:User's mean activity timeslice number avts and place balanced nature vector BA is sent to by source user s
Each user r that meets, calculates each weight w eight on place j ∈ { 1 ..., h }sjAnd weightrj;Behavior place weights
Computational methods are as follows:
Calculate Active duration regulation attribute Ei:
Wherein utsiRepresent that user i consumes activity time piece sum daily,Duration adjusts attribute
Represent considerations of the user i to timeslice sum.k1, b is empirical parameter.B is used to adjust user's i timeslice ratios, value model
Enclose for [0,1].When b values are 0 the complete time will be used in representation formula when b values are 1 without using timeslice ratio
Piece ratio
Calculating behavior factor B eAij:
BeAijUser i is represented to behavior place j degree of correlation, its value is higher, illustrates that user i is more related to place j.
User i is for the computational methods of behavior place j weights:
weightij=BeAij·BAj (5)
Step:7:Into the initiating line stage, if weightrj≥weightsjIf the user is rj, then source user
Forward the data to rj, otherwise do not forward;
Step 8:Repeat step:6-step 7, until all h behavior places all search out all corresponding all rj;
Step 9:Source user s deletes the data of itself preservation, and now source user is initialized the incremental route of h bars;
Step:10:User r on every circuitjInquire weights of the user q each run on behavior place j
Weightqj;
Step 11:Into gradient incremental stages, if weightqj≥weightrjj, then rjForward the data to q, rjDelete
Except data;Otherwise do not forward;
Step:12:10-step 11 of repeat step, until weightqj≥thj;
Step:13:Into the multicast stage, in data lifetime, meet weight for any user qqj≥thjIf
Meet any user t to meetThen user q copies data to user t, terminates.
Claims (1)
1. a kind of opportunistic data transmission method based on more behavior places, it is characterised in that comprise the following steps that:
Step 1:If number of users is n, place quantity is m, and user i ∈ { 1 ..., n } consume in behavior place j ∈ { 1 ..., m }
Time with timeslice quantity (time slice) tsijMeasurement, the length of timeslice is fixed as tl, if user i is in behavior place j
The total time consumed is Tij, then tsij=Tij/tl;
Step 2:The mobile trajectory data that server is submitted according to user i, counting user i to the timeslice in certain behavior place to
Measure TSi=(tsi1,tsi2,…tsim), and result of calculation is stored in server in the form of user/behavior place confederate matrix;
Updated immediately when server receives user i track data every time in user/behavior place confederate matrix corresponding to the user
Information, and will statistics gained timeslice vector T SiIt is sent to user;
Step 3:Source user s specifies TBP=((p1,th1),(p2,th2),…,(ph,thh)), h≤m, wherein pjAnd thj, j ∈
1 ..., and h } it is respectively behavior place and corresponding behavior place threshold values;S sends behavior place vector P to server;
Step 4:Server calculates all user's mean activity timeslice number avts, and is sent to source user s, and wherein user is averaged
Activity time piece number avts computational methods are:
<mrow>
<mi>a</mi>
<mi>v</mi>
<mi>t</mi>
<mi>s</mi>
<mo>=</mo>
<mrow>
<mo>(</mo>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>n</mi>
</munderover>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>m</mi>
</munderover>
<msub>
<mi>ts</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>/</mo>
<mi>n</mi>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>)</mo>
</mrow>
</mrow>
Step 5:The behavior place balanced nature that server is specified according to user/all source users of behavior place confederate matrix calculating
Vectorial BA=(BA1,BA2,…,BAh), and send to source user s, wherein, place j ∈ { 1 ..., h } balanced nature BAjMeter
Calculation method is:
<mrow>
<msub>
<mi>BA</mi>
<mi>j</mi>
</msub>
<mo>=</mo>
<mi>log</mi>
<mfrac>
<mrow>
<mi>n</mi>
<mo>-</mo>
<msub>
<mi>pv</mi>
<mi>j</mi>
</msub>
<mo>+</mo>
<mn>0.5</mn>
</mrow>
<mrow>
<msub>
<mi>pv</mi>
<mi>j</mi>
</msub>
<mo>+</mo>
<mn>0.5</mn>
</mrow>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>2</mn>
<mo>)</mo>
</mrow>
</mrow>
pvjThe total number of persons averagely accessed daily for behavior place j, i.e., jth row are not 0 number in confederate matrix;BAjAs complete
Office the factor, consideration be behavior place j relative importance;
Step 6:User's mean activity timeslice number avts and place balanced nature vector BA is sent to each by source user s
Meet user r, calculates each weight w eight on place j ∈ { 1 ..., h }sjAnd weightrj;Behavior place weight computing
Method is as follows:
Calculate Active duration regulation attribute Ei:
<mrow>
<msub>
<mi>E</mi>
<mi>i</mi>
</msub>
<mo>=</mo>
<msub>
<mi>k</mi>
<mn>1</mn>
</msub>
<mrow>
<mo>(</mo>
<mo>(</mo>
<mrow>
<mn>1</mn>
<mo>-</mo>
<mi>b</mi>
</mrow>
<mo>)</mo>
<mo>+</mo>
<mi>b</mi>
<mo>&CenterDot;</mo>
<mfrac>
<mrow>
<msub>
<mi>uts</mi>
<mi>i</mi>
</msub>
</mrow>
<mrow>
<mi>a</mi>
<mi>v</mi>
<mi>t</mi>
<mi>s</mi>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>3</mn>
<mo>)</mo>
</mrow>
</mrow>
Wherein utsiRepresent that user i consumes activity time piece sum daily,Duration regulation attribute representative is used
Considerations of the family i to timeslice sum.k1, b is empirical parameter;B is used to adjust user's i timeslice ratios, span for [0,
1];When b values are 0 complete timeslice ratio will be used in representation formula when b values are 1 without using timeslice ratio
Calculating behavior factor B eAij:
<mrow>
<msub>
<mi>BeA</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<mo>(</mo>
<msub>
<mi>k</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<mn>1</mn>
<mo>)</mo>
<mo>&CenterDot;</mo>
<msub>
<mi>ts</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
</mrow>
<mrow>
<msub>
<mi>E</mi>
<mi>i</mi>
</msub>
<mo>+</mo>
<msub>
<mi>ts</mi>
<mrow>
<mi>i</mi>
<mi>j</mi>
</mrow>
</msub>
</mrow>
</mfrac>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>4</mn>
<mo>)</mo>
</mrow>
</mrow>
BeAijUser i is represented to behavior place j degree of correlation, its value is higher, illustrates that user i is more related to place j;
User i is for the computational methods of behavior place j weights:
weightij=BeAij·BAj (5)
Step:7:Into the initiating line stage, if weightrj≥weightsjIf the user is rj, then source user is by number
According to being transmitted to rj, otherwise do not forward;
Step 8:Repeat step 6 is to step 7, until all h behavior places all search out corresponding rj;
Step 9:Source user s deletes the data of itself preservation, and now source user is initialized the incremental route of h bars;
Step:10:User r on every circuitjInquire weights Weights of the user q each run on behavior place jqj;
Step 11:Into gradient incremental stages, ifThen rjForward the data to q, rjDelete data;
Otherwise do not forward;
Step:12:Repeat step 10 is to step 11, until weightqj≥thj;
Step:13:Into the multicast stage, in data lifetime, meet weight for any user qqj≥thjIf meet
Any user t meetsThen user q copies data to user t, terminates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510307475.XA CN104954986B (en) | 2015-06-05 | 2015-06-05 | A kind of opportunistic data transmission method based on more behavior places |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510307475.XA CN104954986B (en) | 2015-06-05 | 2015-06-05 | A kind of opportunistic data transmission method based on more behavior places |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104954986A CN104954986A (en) | 2015-09-30 |
CN104954986B true CN104954986B (en) | 2018-04-10 |
Family
ID=54169263
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510307475.XA Active CN104954986B (en) | 2015-06-05 | 2015-06-05 | A kind of opportunistic data transmission method based on more behavior places |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104954986B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105872957B (en) * | 2016-05-04 | 2019-01-18 | 西安交通大学 | A kind of opportunistic data uploading method towards intelligent perception |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101977226A (en) * | 2010-10-28 | 2011-02-16 | 北京航空航天大学 | Novel opportunity network data transmission method |
CN103747523A (en) * | 2014-01-14 | 2014-04-23 | 上海河广信息科技有限公司 | User position predicating system and method based on wireless network |
CN104199828A (en) * | 2014-07-26 | 2014-12-10 | 复旦大学 | Method for establishing social network based on transaction log data |
-
2015
- 2015-06-05 CN CN201510307475.XA patent/CN104954986B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101977226A (en) * | 2010-10-28 | 2011-02-16 | 北京航空航天大学 | Novel opportunity network data transmission method |
CN103747523A (en) * | 2014-01-14 | 2014-04-23 | 上海河广信息科技有限公司 | User position predicating system and method based on wireless network |
CN104199828A (en) * | 2014-07-26 | 2014-12-10 | 复旦大学 | Method for establishing social network based on transaction log data |
Non-Patent Citations (1)
Title |
---|
CSI: A paradigm for behavior-oriented profile-cast services in mobile networks;Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy;《Ad Hoc Networks》;20110626;第二章-第八章 * |
Also Published As
Publication number | Publication date |
---|---|
CN104954986A (en) | 2015-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103024017B (en) | A kind of social networks important goal and Community Group recognition methods | |
CN103617279A (en) | Method for achieving microblog information spreading influence assessment model on basis of Pagerank method | |
CN102646122B (en) | Automatic building method of academic social network | |
Naaman | Geographic information from georeferenced social media data | |
Jin et al. | Location-based social networking data: exploration into use of doubly constrained gravity model for origin–destination estimation | |
CN106055627A (en) | Recognition method of key nodes of social network in topic field | |
CN103116611A (en) | Social network opinion leader identification method | |
CN105809554A (en) | Prediction method of hot topics participated by users in social networks | |
CN104077412B (en) | A kind of microblog users interest Forecasting Methodology based on more Markov chains | |
CN104601586B (en) | The outsourcing statistical method that a kind of disclosure can verify that | |
Liu et al. | Analysis of rumor spreading in communities based on modified SIR model in microblog | |
CN104915889A (en) | Method of acquiring comprehensive load model parameters in online mode based on daily load curve | |
CN104954986B (en) | A kind of opportunistic data transmission method based on more behavior places | |
Li et al. | Secure federated learning with efficient communication in vehicle network | |
Zhang et al. | Cellular traffic offloading via link prediction in opportunistic networks | |
CN103179630A (en) | Data transmission method under opportunity network | |
CN108052961B (en) | Multi-factor decision-making method for activity recommendation of active social network users | |
CN105589916A (en) | Extraction method for explicit and implicit interest knowledge | |
CN107577727A (en) | A kind of One-male unit behavioral trait analysis method | |
CN108595475B (en) | Cache node selection method in mobile social network | |
CN106844463A (en) | A kind of lsa cache algorithm of pervasive game equilibrium | |
CN107562871A (en) | Social network influence power user based on social capital sorting out value has found method | |
Fu et al. | Preferential information dynamics model for online social networks | |
CN109361556A (en) | A kind of key node cognitive method based on node entropy and structural hole | |
CN106294704A (en) | A kind of exhibitions trade information retrieval server, client, system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |