A k-nearest Neighbour Query Processing Strategy Using the mqr-tree

被引:0
|
作者
Osborn, Wendy [1 ]
机构
[1] Univ Lethbridge, Dept Math & Comp Sci, Lethbridge, AB T1K 3M4, Canada
关键词
Location-based services; Spatial access methods; k-nearest neighbour query; ALGORITHM;
D O I
10.1007/978-3-319-65521-5_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a k-nearest neighbour query processing strategy that utilizes a recently proposed spatial access method, the mqr-tree, to narrow down the search for candidate nearest neighbours. It requires the traversal of only one path of the tree, and in the majority of cases, does not require backtracking all the way to the root. The mqr-tree-based k-nearest neighbour strategy is evaluated both individually and compared against the brute-force method for running time. It is shown that the proposed approach performs better in many cases. In addition, the running time is not affected by the number of points being indexed or the number of nearest neighbour being sought.
引用
收藏
页码:566 / 577
页数:12
相关论文
共 50 条
  • [1] Processing Probabilistic K-Nearest Neighbor Query Using Rlsd-tree
    Huang, Yuan-Ko
    Lin, Lien-Fa
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 560 - 567
  • [2] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database
    Xu, Rui
    Morozov, Kirill
    Yang, Yanjiang
    Zhou, Jianying
    Takagi, Tsuyoshi
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 181 - 197
  • [3] An Query Processing for Continuous K-Nearest Neighbor Based on R-Tree and Quad Tree
    Zou, Yon-Gui
    Qiang, Song
    Yang, Fu-Ping
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 35 - 40
  • [4] Literature Study on k-Nearest Neighbor query processing
    Anuja, K., V
    Mani, Shinu Acca
    [J]. 2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [5] Continuous k-Nearest Neighbour Strategies Using the mqrtree
    Osborn, Wendy
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018, 2019, 22 : 168 - 181
  • [6] Outlier detection using k-nearest neighbour graph
    Hautamäki, V
    Kärkkäinen, I
    Fränti, P
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 3, 2004, : 430 - 433
  • [7] Estimating individual tree growth with the k-nearest neighbour and k-most similar neighbour methods
    Sironen, S
    Kangas, A
    Maltamo, M
    Kangas, J
    [J]. SILVA FENNICA, 2001, 35 (04) : 453 - 467
  • [8] Efficient outsourcing of secure k-nearest neighbour query over encrypted database
    Xu, Rui
    Morozou, Kirill
    Yang, Yanjiang
    Zhou, Jianying
    Takagi, Tsuyoshi
    [J]. COMPUTERS & SECURITY, 2017, 69 : 65 - 83
  • [9] Query-specific signature selection for efficient k-nearest neighbour approximation
    Park, Youngki
    Hwang, Heasoo
    Lee, Sang-goo
    [J]. JOURNAL OF INFORMATION SCIENCE, 2017, 43 (04) : 440 - 457
  • [10] Balanced k-nearest neighbour imputation
    Hasler, Caren
    Tille, Yves
    [J]. STATISTICS, 2016, 50 (06) : 1310 - 1331