Road network-based region of interest mining and social relationship recommendation

  • Rong Tan
  • Yunpeng ZhangEmail author


Region of interest (ROI) discovery is among the most common functions in location-based social networking services (LBSNS). While former researches mainly utilize the accurate location coordinates history, the road context-based active region extraction algorithm (RAREA) proposed in this paper explores the method to extract those regions with road contexts. Furthermore, based on the active regions extracted by RAREA, the kNN consistency-based relationship recommendation algorithm (kNNC-RRA) is proposed as well. The kNNC-RRA compares the similarity degree of the active regions among the users to find the individuals with similar preferences to recommend the potential relationships. Experimental results illustrate that by analyzing the characteristics of those road contexts, ROIs are able to be discovered with high efficiency. And our work shows that both privacy protection and personalized services can be achieved in LBSNS.


Region of interest discovery Relationship recommendation Location-based social networking services Mobile computing Location privacy protection Road network Social computing 



The authors would like to thank the reviewers for their invaluable comments and suggestions, which greatly helped to improve the presentation of this paper.


This research was sponsored by the Shanghai Natural Science Fund (Nos. 14ZR1429800, 15ZR1430000) and the Research Fund of National 12th Five-Year Education Plan (No. EIA140412).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.


  1. Abdel-Basset M, Fakhry AE, El-henawy I, Qiu T, Sangaiah AK (2017) Feature and intensity based medical image registration using particle swarm optimization. J Med Syst 41(12):197CrossRefGoogle Scholar
  2. Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: IEEE international conference on computer science and engineering, pp 1036–1042Google Scholar
  3. Chiang HS, Sangaiah AK, Chen MY, Liu JY (2018) A novel artificial bee colony optimization algorithm with SVM for bio-inspired software-defined networking. Int J Parallel Program. Google Scholar
  4. Cho E, Myers SA, Leskovec J (2011) Friendship and mobility: user movement in location-based social networks. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 1082–1090Google Scholar
  5. Cranshaw J, Toch E, Hong J, Kittur A, Sadeh N (2010) Bridging the gap between physical location and online social networks. In: 12th international conference on ubiquitous computing, pp 119–128Google Scholar
  6. Giannotti F, Nanni M, Pinelli F, Pedreschi D (2007) Trajectory pattern mining. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 330–339Google Scholar
  7. Gu JZ, He L, Yang J, Lu Z (2009) Location aware mobile cooperation design and system. Int J Signal Process Image Process Pattern Recognit 2(4):49–60Google Scholar
  8. Han T, Zeng M, Zhang L, Sangaiah AK (2018) A channel-aware duty cycle optimization for node-to-node communications in the internet of medical things. Int J Parallel Program. Google Scholar
  9. Hightower J, Consolvo S, LaMarca A, Smith I, Hughes J (2005) Learning and recognizing the places we go. In: Proceedings of Ubicomp, pp 159–176Google Scholar
  10. Jiang W, Yang X, Wu W, Liu K, Ahmad A, Sangaiah AK, Jeon G (2018) Medical images fusion by using weighted least squares filter and sparse representation. Comput Electr Eng 67:252–266CrossRefGoogle Scholar
  11. Karki BR, Hamalainen A, Porras J (2008) Social networking on mobile environment. In: Proceedings of ACM/IFIP/USENIX middleware conference on companion, pp 93–94Google Scholar
  12. Kayastha N, Niyato D, Wang P, Hossain E (2011) Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc IEEE. 99(12):2130–2158CrossRefGoogle Scholar
  13. Kumar S, Singh SK, Abidi AI, Datta D, Sangaiah AK (2017) Group sparse representation approach for recognition of cattle on muzzle point images. Int J Parallel Program 46(5):812–837CrossRefGoogle Scholar
  14. Liu S, Fu W, He L, Zhou JT, Ma ZM (2017a) Distribution of primary additional errors in fractal encoding method. Multimed Tools Appl 76(4):5787–5802CrossRefGoogle Scholar
  15. Liu S, Pan Z, Cheng X (2017b) A novel fast fractal image compression method based on distance clustering in high dimensional sphere surface. Fractals 25(4):1740004CrossRefGoogle Scholar
  16. Lv MQ, Li YL, Yuan ZM, Wang QH (2015) Route pattern mining from personal trajectory data. J Inf Sci Eng 31(1):147–164Google Scholar
  17. Lv N, Chen C, Qiu T, Sangaiah AK (2018) Deep learning and superpixel feature extraction based on sparse autoencoder for change detection in SAR images. IEEE Trans Ind Inf 14(12):5530–5538CrossRefGoogle Scholar
  18. Medhane DV, Sangaiah AK (2018) PCCA: position confidentiality conserving algorithm for content-protection in e-governance services and applications. IEEE Trans Emerg Top Comput Intell 2(3):194–203CrossRefGoogle Scholar
  19. Mokbel MF (2007) Privacy in location-based services: start-of-the-art and research directions. In: 8th international conference on mobile data management, p 228Google Scholar
  20. Sangaiah AK, Samuel OW, Li X, Abdel-Basset M, Wang H (2017) Towards an efficient risk assessment in software projects—fuzzy reinforcement paradigm. Comput Electr Eng. Google Scholar
  21. Santos AA, Furtado AA, Alvares LO, Pelekis N, Bogorny V (2015) Inferring relationships from trajectory data. In: Brazilian symposium on geoinformatics, pp 68–79Google Scholar
  22. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278CrossRefGoogle Scholar
  23. Sodhro AH, Luo Z, Sangaiah AK, Baik SW (2018) Mobile edge computing based QoS optimization in medical healthcare applications. Int J Inf Manag. Google Scholar
  24. Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557–570MathSciNetCrossRefzbMATHGoogle Scholar
  25. Tan R, Gu JZ, Chen P, Zhong Z (2013) Link prediction using protected location history. In: International Conference on computational and information sciences, pp 795–798Google Scholar
  26. Wang D, Pedreschi D, Song C, Giannotti F, Barabási AL (2011) Human mobility, social ties, and link prediction. In: ACM SIGKDD conference on knowledge discovery and data mining, pp 1100–1108Google Scholar
  27. Wang YQ, Yan BJ, Yang YJ, Yang LU, Liu LD (2017) Urban area division and function discovery based on trajectory data. In: 2nd international conference on artificial intelligence: techniques and applications, pp 179–182Google Scholar
  28. Yoon H, Zheng Y, Xie X, Woo W (2012) Social itinerary recommendation from user-generated digital trails. Pers Ubiquitous Comput 16(5):469–484CrossRefGoogle Scholar
  29. Zheng Y, Xie X (2011) Learning travel recommendations from user-generated GPS traces. ACM Trans Intell Syst Technol 2(1):2CrossRefGoogle Scholar
  30. Zheng Y, Zhang L, Xie X, Ma WY (2009) Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of the 18th international conference on World wide web, pp 791–800Google Scholar
  31. Zheng VW, Zheng Y, Xie X, Yang Q (2010) Collaborative location and activity recommendations with GPS history data. In: Proceedings of the 19th international conference on World wide web, pp 1029–1038Google Scholar
  32. Zheng Y, Zhang L, Ma Z, Xie X, Ma WY (2011) Recommending friends and locations based on individual location history. ACM Trans Web 5(1):5CrossRefGoogle Scholar
  33. Zhou C, Frankowskic D, Ludford P, Shekhar S, Terveen L (2004) Discovering personal gazetteers: an interactive clustering approach. In: Proceedings of the 12th annual ACM international workshop on geographic information systems, pp 266–273Google Scholar
  34. Zhou C, Frankowski D, Ludford P, Shekhar S, Terveen L (2007) Discovering personally meaningful places: an interactive clustering approach. ACM Trans Inf Syst 25(3):12CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Shanghai Business SchoolCollege of Information and Computer ScienceShanghaiPeople’s Republic of China
  2. 2.College of TechnologyUniversity of HoustonHoustonUSA

Personalised recommendations