SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011



          Data Management In Cellular Networks Using
                      Activity Mining
                                                  Dr. R. Ramachandran, Ph.D.
                                                              Principal
                                                         Dept. of CSE,SVCE
                                                          Chennai, India
                                                         rrama@svce.ac.in
                                                       V. Aishwaryalakshmi
                                                            PG Scholar
                                                        Dept. of CSE, SVCE
                                                           Chennai, India
                                                      neefavenkat@gmail.com

Abstract— In the recent technology advances, an increasing                locations or service distribution. The regularity in service
number of users are accessing various information systems                 invocation may come from the dependencies between services
via wireless communication. The majority users in a mobile                or the proximity of service providers. It is potentially beneficial
environment are moving and accessing wireless services for                to discover such mobility and service patterns to make easy
the activities they are currently unavailable inside. We                  network and data management. We propose the idea of complex
propose the idea of complex activity for characterizing the
                                                                          activity for characterizing the continuously changing complex
continuously changing complex behavior patterns of mobile
users. For the purpose of data management, a complex activity             behavior patterns of mobile users. A complex activity is a
is copy as a sequence of location movement, service requests,             sequence of location movement, service requests, the
the coincidence of location and service, or the interleaving of           coincidence of location and service, or the interleaving of all
all above. An activity may be composed of sub activities.                 above. An activity may be composed of sub activities. Different
Different activities may exhibit dependencies that affect user            activities may show dependencies that affect user behaviors.
behaviors. We argue that the complex activity concept provides            We argue that the activity concept provides a more specific,
a more specific, rich, and detail description of user behavioral          rich, and detail description of user behavioral patterns which
patterns which are very useful for data management in mobile              are very useful for data management in mobile environments.
environments. Correct exploration of user activities has the
                                                                          Proper exploration of such activities enables data management
possible of providing much higher quality and personalized
services to individual user at the right place on the right time.         system to predict the user’s next move, intended service or
We, therefore, propose new methods for complex activity                   both for providing much higher quality and personalized
mining, incremental maintenance, online detection and                     services to individual user at the right place on the right time.
proactive data management based on user activities. In                    Such kind of advanced information services call for new
particular, we develop pre-fetching and pushing techniques                methods of complex activity mining, incremental maintenance,
with cost sensitive control to make easy analytical data                  online detection, and proactive data management based on
allocation. First round implementation and simulation results             user activities. We propose new pattern mining and patterns
shows that the proposed framework and techniques can                      processing algorithms to the discovery and maintenance of
significantly increase local availability, conserve execution
                                                                          complex activities in mobile environments. Furthermore, we
cost, reduce response time, and improve cache utilization.
                                                                          develop pre-fetching, pushing, and handoff techniques with
Keywords-Activity mining, Prefectching,,pushing, proactive                cost sensitive control to make easy predictive data allocation
data management, Genetic Algorithm;                                       and personalized services. Preliminary implementation and
                                                                          simulation results demonstrate that the activity-based
                         I. INTRODUCTION                                  proactive data management strategies can significantly
                                                                          conserve execution cost, reduce response time, improve cache
     Diverse mobile services and development in wireless                  utilization, and increase local availability.
networks have stimulated an enormous number of people to
employ mobile devices such as cellular phones and portable                                     II. RELATED WORK
laptops as their communications means. The most salient feature
of wireless networks is mobility support, which enables mobile               It has been known for quite sometime that user behavior
users to communicate with others regardless of location.                  patterns are important for effective mobile computing. The
Majority of users in a mobile environment do not travel at random.        First stage along this line of research is the acquisition of
They navigate from place to place with specific purposes in               user behavior. Among the various methods for learning user
mind. In many cases, the patterns of location movement and                behavior, data mining is probably the most widely used
service invocation of mobile users targeting similar purposes             technique. It is well suited for discovering hidden patterns
show strong similarity. The common patterns of location                   from large volume of data such as transaction log. The mining
movement may due to geographic relationships between                      of mobility patterns, in particular focus attention of some
                                                                          previously proposed work.
                                                                     38
© 2011 ACEEE
DOI: 01.IJIT.01.02.512
ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011


User Mobility Profile (UMP) is a combination of historic                                    III. COMPLEX ACTIVITIES
records and predictive patterns of mobile terminals, which
                                                                          A. Behavior pattern
serves as fundamental information for mobility management
and enhancement of Quality of Service (QoS) in wireless                       We analyze the user behaviour patterns in Mobile
multimedia networks. UMP framework is developed for                       environments and formally characterize the idea of complex
estimating service patterns and tracking mobile users,                    activities. Users in a mobile environment travel from one
including descriptions of location, mobility, and service                 place to another. The moving pattern of a user can naturally
requirements. For each mobile user, the service requirement               be modelled as sequences of locations visited by the user.
is estimated using a mean square error method. Moreover, a                Mobile users also invoke services one after another when
new mobility model is designed to characterize not only                   travelling. Service patterns emerge if a sequence of services
stochastic behaviors, but historical records and predictive               is repeatedly invoked by the same or different user. Some
future locations of mobile users as well. Therefore, it                   services are offered only at specific locations such as gas
incorporates aggregate history and current system parameters              stations, restaurants, movie theatres, etc. In such cases,
to acquire UMP. In particular, an adaptive algorithm is                   locations and service invocations always come in pairs. Based
designed to predict the future positions of mobile terminals              on the Analysis above, we can characterize the basic user
in terms of location probabilities based on moving directions             behaviour Patterns into three categories:
and residence time in a cell. The authors G. Resta and P.                 Location-only patterns (L-type): Sequences of locations
Santi,.[1] have proposed their schemes about User Behavior                Those are repeatedly visited by mobile users.
model approach in mobile environments and I.F. Akyildiz                   Service-only patterns (S-type): Sequences of services Those
and W. Wang,[2] describes “The Predictive User Mobility                   are repeatedly invoked by mobile users.
Profile Framework for Wireless environments.                              Location-service patterns (LS-type): Sequences of Location-
R.V. Mathivaruni and V.Vaidehi[3] proposes An activity                  service pairs that are repeatedly visited and invoked by mobile
based mobility prediction strategy using markv modeling for               users. Location-only patterns occur when users are engaged
wireless networks which describes the foremost objective                  in Movement activities that are formed by geographical
of a wireless network is to facilitate the communication of               Constraints. Service-only patterns arise when users are
mobile users regardless of their point of attachment to the               embarked on invocation activities that are formed by service
network. The system must discern the location of the mobile               dependencies. Location-service patterns are commonly seen
terminal, to afford flawless service to the mobile terminal.              when there are strong associations between location and
Mobility prediction is widely used to assist handoff                      Service pairs. Sometimes, patterns are the result of personal
management, resource reservation and service pre                          habits. These patterns constitute the primitive activities in
configuration. Prediction techniques that are currently used              Mobile environments. Built on top of primitive activities, a
don’t consider the motivation behind the movement of mobile               complex activity can be a combination of any number of
nodes and incur huge overheads to manage and manipulate                   primitive or other complex activities as sub activities. Complex
the information required to make predictions. This paper                  activities: A complex activity A ={a1,a2..} is a frequently
proposes an activity based mobility prediction technique that             occurring sequence of activities such That each ai is either a
uses activity prediction and Markov modeling techniques to                primitive or a complex activity. Based on the recursive
devise a prediction methodology that could make accurate                  definition, a primitive activity is Considered as the simplest
predictions than existing techniques.                                     type of complex activity. Therefore, the term activity is used
On The effect of group mobility to data replication in Ad-              when there is no need to Distinguish between them.. We
hoc networks: In this paper, we address the problem of replica            argue that the notion of Complex activities hold the key to
allocation in a mobile ad-hoc network by exploring group                  effective data management in mobile environments for several
mobility. We first analyze the group mobility model and derive            reasons: Complex activities can be used to faithfully model
several theoretical results. In light of these results, we propose        User behaviour in mobile environments. By identifying the
a replica allocation scheme to improve the data accessibility.            current activity of a mobile user, we can predict his/her next
A. Yamasaki, H. Yamaguchi, S. Kusumoto, and T. Higashino                move on both location and service invocation with much
[4] design a Mobility-aware Data management (MoDA)                        higher accuracy than traditional way of relying on motion
scheme for mobile ad hoc networks (MANETs) composed by                    estimation and accumulated read/write statistics. Once the
mobile nodes such as urban pedestrians and vehicles. By                   user behaviour can be predicted with high Accuracy, it
fully utilizing the knowledge about the trajectories of mobile            becomes possible to provide proactive Services for the user.
nodes, MoDA determines how replicas of data are copied                    In other words, we can allocate the required data items and
and transferred among mobile nodes to provide the required                reserve the necessary Resources at the right place on the
data accessibility. Experimental results have shown that                  right time.
MoDA could achieve the small number of data transfers                     B. Service Architecture
among mobile nodes while keeping reasonable accessibility.
                                                                             Activity mining is the characterizing of continuously
                                                                          changing complex behavior patterns of mobile users. Our
                                                                          algorithm for activity mining is based on the popular Apriori
                                                                          algorithm to identify all primitive and complex activities of a
                                                                          user behavior. The activities identified by the mining algorithm
                                                                     39
© 2011 ACEEE
DOI: 01.IJIT.01.02. 512
ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011


do not have any structure information except for sequences.               Input: t = {a1; a2; . . . ; an} is a transaction and
The relationships between activities are not clear. They are              c = {c1; c2; . . . ; cm} is an activity candidate.
not well suited for activity processing and data management.              if c ==0 ; then return True;
For this purpose we devise an efficient data structure named              if n < m then return False;
as activity tree for the representation and incremental                   for (i = 1; i d”n –m, 1++) do
maintenance of activities. After successful identification of             if action Activity Match{ ai; c1} ^
activity patterns, we still need to recognize the current activity        contain Activity{ aiþ1; . . . ; an}, {c2; . . . ; cm} then
of a user. Once the activity of a user can be detected and                return True;
prioritized, we are all set for presenting the proactive data             end
management techniques namely                                              Return False;
      (a) Proactive pushing                                               Function action Activity Match (a, c)
      (b) Predictive handoff                                              Input: a is an action and c is a primitive activity.
      (c) Precision pre fetching                                          If c:location ‘“ null ^ c:service‘“ null then
Once the user behavior can be predicted with high accuracy,               Return a:location ==c:location ^ a:service == c:service;
it becomes possible to provide Proactive services for the                 else if c:location ‘“ null then
user. In other words, we can allocate the required data items             return a:location == c:location;
and reserve the necessary resources at the right place on the             else
right time. To facilitate such an activity-based proactive data           return a:service == c:service;
management services, several issues must be properly
                                                                          C.    Proactive Datamangement
addressed. These issues, in turn, pose significant challenges
to information system designers and service providers.                        Proactive data management can contain following steps
Activity mining: We must be able to unearth the complex                         Activity detection
activities from large volumes of user behavior logs. This                       Activity weighting and ranking
naturally demands effective algorithms for data analysis and                    Data management strategies
activity mining.                                                                Activity maintenance
Activity representation: Once the activities are identified,              In the Activity Detection, User maintains the activity table
we need efficient structures for representing the activities to           that store the current move of the user from the activity tree
facilitate effective data management.                                     index. In the Activity Weighting and Ranking, Ranking the
Activity maintenance: Due to highly transient nature of mobile            possible move of the user by use of
environments, complex activities evolve dynamically over                                      1.       Service distance(d)
time. This calls for incremental maintenance techniques that                                  2.       Service data size(t)
can smoothly adapt to the changes.                                                            3.       Intensity(ρ)
Activity detection: After successful identification of activity                               4.       Conformance ratio(γ)
patterns, we still need to recognize the current activity of a                                5.       Degree of sharing(w)
user. The online detection techniques must be very efficient.                                 6.       Minimal co occurrence(m)
Otherwise, we may run the risk of late identification of an               In the data management strategies, we can find how to data
activity that a user is no longer engaged i                               transfer and maintenance, that is If cell provide L only-
Proactive data management: To provide effective information               proactive pushing. Else If cell provide S only- Predictive
services, proactive or predictive data management techniques              handoff else If cell provide L & S-Precision pre fetching
are highly desirable with the knowledge of a user’s possible              In the Activity Maintenance, they Update the behavior details
next move or service invocation. The algorithm used is given              in the behavior table. For an activity a and the set of sharing
below:                                                                    nodes W, we define the activity score of a as follows:
Function apriori_ gen (Ak_1)                                                        a.score=(d×t)(“ai(λ(ai)×α(parent(ai))m))/W
Ck =0 ;                                                                   Once the activity of a user can be detected and prioritized,
for p 2 Ak_1 do                                                           we are all set for presenting the proactive data management
for q 2 Ak_1 do                                                           techniques. In general, when a user is recognized to be
if p:item1 =q:item1 ^ . . . ^ p:itemk_2 = q:itemk_2 ^                     engaged in an activity, we can predict with high probability
p:itemk_1 ‘“=q:itemk_1 then                                               the user’s next move (including location and/or service
Ck þ= q:itemk_1;                                                          invocation).
end                                                                       Proactive pushing—When the next move of a user is a
end                                                                       service-only activity, we know what the user is likely to invoke
for c 2 Ck do                                                             but don’t know where he/she is heading. Therefore, it is
for {k “1]-subsets s of c do                                              potentially beneficial to push the service data directly to the
if s € Ak_1 then delete c from Ck;                                        client cache such that it is immediately available when the
end                                                                       service is actually invoked.
end                                                                       Predictive handoff—When the next step is a location-only
return Ck;                                                                activity, we know where the user is going with no knowledge
Function contain Activity (t, c)                                          of the service invocation.
                                                                     40
© 2011 ACEEE
DOI: 01.IJIT.01.02. 512
ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011


Precision pre fetching—If the next activity is a location                mechanism that, based on the rewards received, select which
service pair, we know exactly the user’s next move and what              strategy should be applied at the given moment of the search.
service the user is going to invoke.. With the strategies in             Suppose we have K > 1 strategies in the pool A = {a1, · · · ,
mind, selecting proper data management operations becomes                aK} and a probability vector P(t) = {p1(t), · · · , pK(t)}
straightforward. For a user engaged in a complex activity, we
check the activity tree to retrieve the next activity. If it is a
service-only activity, we proactively push the service data              In this work, the PM (Probability Matching) technique is
toward the user. If it is a location-only activity, we contact           used to adaptively update the probability pa (t) of each
the base station of the predicted location and send out the              strategy a based on its known performance (frequently
data used by the current service. Finally, if it is a location-          updated by the rewards received). Denote ra (t) as the reward
service pair, we inform the base station of the next location to         that a strategy a receives after its application at time t. qa (t)
initiate the pre fetching of the predicted service data.                 is the known quality (or empirical estimate) of a strategy a,
D Cost sensitive Operation                                               that is updated as follows
                                                                                      qa(t + 1) = qa(t) + α[ra(t) . qa(t)]
    Even with careful activity identification and proper data
management operation selection, it may not be always cost
                                                                         Where            is the adaptation rate. Based on this quality
effective to apply the selected operations. The purpose of
                                                                         estimate, the PM method updates the probability pa (t) of
cost-sensitive operation control is to judiciously estimate
                                                                         applying each operator as follows
the relative cost and benefit before applying the operations.
They are only performed when the expected saving is higher
than the management overhead. For proactive pushing, we
push the predicted service data directly to the client cache.            Where pmin       (0, 1) is the minimal probability value of each
The pushing cost is, therefore, the service data transfer cost           strategy, used to ensure that no operator gets lost.
from the source to the client as follows: S(fd+1) If the
prediction is correct, the user’s request can be satisfied
immediately without further delay or cost. However, with
probability 1"α, we may need the extra cost of waiting and
transferring the data of the service actually invoked by the
user when the prediction is wrong. This can be characterized
as follows: (1-α)((D+R/Bf d+R/Bt)λ+R(fd+l)



Since α can be estimated by the conformance rate while C, D,
and T can also be measured once the service data are
identified, can be used for controlling the application of the
proactive pushing strategy.Degree of sharing, a data
management operation can benefit many users at the same
time which provides a form of consideration on overall system.           B. Combining Road and Ring topology
Thus system intergration.                                                    Topology information and mobility prediction are main
                                                                         distinction between the proposed algorithms and is
                      IV.   PROPOSED WORK                                exploitation of road topology map of the destination hotspot
A.    Adaptive Genetic Selection Metastatergies:                         within a cellular network. Road network topology is
                                                                         represented by a stochastic finite state machine that is
      Met strategies for Adaptation that is quickly adjust the           adopted directly from the digital map. Every edge in the map
system when the situation changes, by making use of                      is represented by one state ki for each driving direction.
Adaptive generic algorithm to predict user next move further             Road topology is reorganization and management of node
accurately. One more inclusion is activity prioritization that           parameters and modes of operation from time to time to modify
we can provide first priority to more important service than             the network with the goal of extending its Lifetime while
others in the complex user behavior. On the Adaptive Strategy            preserving other important characteristics. A ring network is
Selection (AdapSS), in the Genetic Algorithms community,                 a network topology in which each node connects to exactly
its objective is to automatically select between the available           two other nodes, forming a single continuous pathway for
possibly ill-known mutation strategies, according to their               signals through each node - a ring.
performance on the current search/optimization process. To
do so, there is the need for two components: the credit                  C. Prefecting techniques:
assignment, that defines how the impact of the strategies on                Mobility prediction is an important maneuver that
the search should be assessed and transformed into a                     determines the location of the mobile terminal by carefully
numerical reward; and the strategy (or operator) selection               manipulating the available information. The prediction
                                                                    41
© 2011 ACEEE
DOI: 01.IJIT.01.02.512
ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011


accuracy depends on the user movement model and the                    not as a physical distance. The nodes of a zone are divided
prediction algorithm used. Two different techniques are                into peripheral nodes and interior nodes. Peripheral nodes
already available for mobility prediction. First technique uses        are nodes whose minimum distance to the central node is
the historical movement patterns of the user to predict the            exactly equal to the zone radius.The nodes whose minimum
user’s whereabouts in future. The second technique uses                distance is less than n are interior nodes. The nodes A–F are
the contextual knowledge. So, An adaptive algorithm is                 interior nodes; the nodes G–J are peripheral nodes and the
designed to predict the future positions of mobile terminals           node K is outside the routing zone. Note that node H can be
in terms of location probabilities based on moving directions          reached by two paths, one with length 2 and one with length
and residence time in a cell. It makes use of LAR and DREAM            3hops. The node is however within the zone, since the
routing technique to find the future mobile states of positions        shortest path is less than or equal to the zone radius. The
respectively.                                                          number of nodes in the routing zone can be regulated by
                                                                       adjusting the transmission power of the nodes. Lowering the
D. Propsed Architecture:Algorithm
                                                                       power reduces the number of nodes within direct reach and
                                                                       vice versa. The number of neighboring nodes should be
                                                                       sufficient to provide adequate reach ability and redundancy.
                                                                       On the other hand, a too large coverage results in many zone
                                                                       members and the update traffic becomes excessive. Further,
                                                                       large transmission coverage adds to the probability of local
                                                                       contention. AZRP refers to the locally proactive routing
                                                                       component as the Adaptive IntrA-zone Routing Protocol
                                                                       (AIARP). The globally reactive routing component is named
                                                                       Adaptive IntEr-zone Routing Protocol (AIERP). AIERP and
                                                                       AIARP are not specific routing protocols. Instead, AIARP is
                                                                       a family of limited-depth, proactive link-state routing
                                                                       protocols. AIARP maintains routing information for nodes
                                                                       that are within the routing zone of the node. Correspondingly,
                                                                       AIERP is a family of reactive routing protocols that offer
                                                                       enhanced route discovery and route maintenance services
                                                                       based on local connectivity monitored by AIARP. The fact
                                                                       that the topology of the local zone of each node is known
                                                                       can be used to reduce traffic when global route discovery is
                                                                       needed. Instead of broadcasting packets, AZRP uses a
          Figure 1. Activity mining with metastrategies
                                                                       concept called border casting. Border casting utilizes the
For performance evaluation, we have developed a suite of               topology information provided by AIARP to direct query
simulation tools using Java language on WinTel platform.               request to the border of the zone. The border cast packet
The layer architecture of the simulator is depicted The                delivery service is provided by the Border cast Resolution
simulation engine is a set of routines to carry out the                Protocol (BRP). BRP uses a map of an extended routing zone
operations designated by other modules. The mobile                     to construct border cast trees for the query packets.
environment simulator is responsible for generating the                Alternatively, it uses source routing based on the normal
network topology, supported services, and user behaviours.             routing zone. By employing query control mechanisms, route
the users get their behaviour models from a behaviour pool.            requests can be directed away from areas of the network that
Each user has a number of behaviours to choose from at                 already have been covered.
random. Each behaviour is associated with a lifetime. When
the lifetime of all behaviours expires, a new set of behaviours                      V. CONCLUSION AND FUTURE WORK
is requested from the pool. To keep the behaviours fresh,
each model has a lifetime in pool to trigger the generation of             We proposed Personalized activity mining and data
new models. Behaviours are selected fromthe pool following             management are expected to provide Even higher quality
Zipf distribution.                                                     services then the proposed schemes. Obtaining rich Resource
                                                                       station and better equipped client services The cold start
E. Implementation of ZRP and AZRP                                      problem owing to the need for an initial behavior log DB
    The Adaptive Zone Routing Protocol, as its name implies,           remains unsolved. We work on that by dynamic tree structure
is based on the concept of zones. A routing zone is defined            and association mining. The Activity Prioritization methods
for each node separately, and the zones of neighboring nodes           can be improved and enables improved service Quality.
overlap. The routing zone has a radius expressed in hops.              Different Management strategies used for exploring activities
The zone thus includes the nodes, whose distance from the              in mobile computing. AZRP can be regarded as a routing
node in question is at most n hops, where the routing zone of          framework rather than as an independent protocol. AZRP
S includes the nodes A–I, but not K. In the illustrations, the         reduces the traffic amount compared to pure proactive or
radius is marked as a circle around the node in question. It           reactive routing. Routes to nodes within the zone are
should however be noted that the zone is defined inhops,               immediately available. AZRP makes an extension for ZRP
                                                                  42
© 2011 ACEEE
DOI: 01.IJIT.01.02.512
ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011


protocol that can adapt well to the complicated network with           [3] J.-L. Huang and M.-S Chen, “On the Effect of Group Mobility
nodes moving non-uniformly. AZRP utilizes the excellent                to Data Replication in Ad-Hoc Networks,” IEEE Trans. Mobile
performance of the hybrid-driven manner of ZRP and                     Computing, vol. 5, no. 5, pp. 492-507, May 2006.
                                                                       [4]R.V. Mathivaruni and V.Vaidehi” An Activity Based Mobility
simultaneously overcomes the bad adaptability of ZRP which
                                                                       Prediction Strategy Using Markov Modeling for Wireless Networks”
assumes each node move uniformly and presets the same
                                                                       Proceedings of the World Congress on Engineering and Computer
zone radius. For the mobility of nodes is variable in the              Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco,
practical networks, our future work may focus on the change            USA
of the zone radius aroused by the mobility change of nodes.            [5] I.F. Akyildiz and W. Wang, “The Predictive User Mobility
This will be more accordant with the reality.                          Profile Framework for Wireless Multimedia Networks,” IEEE/ACM
                                                                       Trans. Networking, vol. 12, no. 6, pp. 1021-1035, Dec. 2004.
                         REFERENCES                                    [6] I.F. Akyildiz and W. Wang, “The Predictive User Mobility
                                                                       Profile Framework for Wireless Multimedia Networks,” IEEE/ACM
[1] G. Resta and P. Santi, “WiQoSM: An Integrated Qos-Aware            Trans. Networking, vol. 12, no. 6, pp. 1021-1035, Dec. 2004.
Mobility and User Behavior Model for Wireless Data Networks,”          [7] W.-S. Soh and H. Kim, “QoS Provisioning in Cellular Networks
IEEE Trans. Mobile Computing, vol. 7, no. 2, pp. 187- 198, Feb.        Based on Mobility Prediction Techniques,” IEEE Comm. Magazine,
2008.                                                                  vol. 41, no. 1, pp. 86-92, Jan. 2003.
[2] A. Yamasaki, H. Yamaguchi, S. Kusumoto, and T. Higashino,           [8] W. Su, S.-J. Lee, and M. Gerla, “Mobility Prediction and Routing
“Mobility-Aware Data Management on Mobile Wireless                     in Ad Hoc Wireless Networks,” Int’l J. Network Management, vol.
Networks,” Proc. IEEE 65th Vehicular Technology Conf., pp. 679-        11, no. 1, pp. 3-30, Jan. 2001.
683, 2007




                                                                  43
© 2011 ACEEE
DOI: 01.IJIT.01.02.512

Contenu connexe

Tendances

3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system
Alexander Decker
 
Ontology Mapping for Dynamic Multiagent Environment
Ontology Mapping for Dynamic Multiagent Environment Ontology Mapping for Dynamic Multiagent Environment
Ontology Mapping for Dynamic Multiagent Environment
IJORCS
 
Improved learning through remote desktop mirroring control
Improved learning through remote desktop mirroring controlImproved learning through remote desktop mirroring control
Improved learning through remote desktop mirroring control
Conference Papers
 
Iaetsd efficient retrieval of face image from
Iaetsd efficient retrieval of face image fromIaetsd efficient retrieval of face image from
Iaetsd efficient retrieval of face image from
Iaetsd Iaetsd
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis
Videoguy
 

Tendances (19)

3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system3.[10 13]location based spatial query processing in wireless system
3.[10 13]location based spatial query processing in wireless system
 
Ontology Mapping for Dynamic Multiagent Environment
Ontology Mapping for Dynamic Multiagent Environment Ontology Mapping for Dynamic Multiagent Environment
Ontology Mapping for Dynamic Multiagent Environment
 
Digital Pen En 2008
Digital Pen En 2008Digital Pen En 2008
Digital Pen En 2008
 
Context-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature ReviewContext-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature Review
 
ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2ZORA MDE Short Presentation 3.2
ZORA MDE Short Presentation 3.2
 
Improved learning through remote desktop mirroring control
Improved learning through remote desktop mirroring controlImproved learning through remote desktop mirroring control
Improved learning through remote desktop mirroring control
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed Service
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Ai
AiAi
Ai
 
Iaetsd efficient retrieval of face image from
Iaetsd efficient retrieval of face image fromIaetsd efficient retrieval of face image from
Iaetsd efficient retrieval of face image from
 
4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis4.Video Conferencing and Diagnosis
4.Video Conferencing and Diagnosis
 
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
Topic 4 -software architecture viewpoint-multi-agent systems-a software archi...
 
Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...
 
Programming Hybrid Services in the Cloud
Programming Hybrid Services in the CloudProgramming Hybrid Services in the Cloud
Programming Hybrid Services in the Cloud
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)
 
542 546
542 546542 546
542 546
 
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
Chapter 7 agent-oriented software engineering ch7-agent methodology-agent met...
 
RoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesRoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
RoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
 
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...
 

En vedette

Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
ankur bhalla
 
CELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEM
Suryani Ilias
 

En vedette (8)

Cellint transportation
Cellint transportation Cellint transportation
Cellint transportation
 
GIS Applied to Mobile Technology
GIS Applied to Mobile TechnologyGIS Applied to Mobile Technology
GIS Applied to Mobile Technology
 
Modern Big Data Analytics Tools: An Overview
Modern Big Data Analytics Tools: An OverviewModern Big Data Analytics Tools: An Overview
Modern Big Data Analytics Tools: An Overview
 
Big Data: tools and techniques for working with large data sets
Big Data: tools and techniques for working with large data setsBig Data: tools and techniques for working with large data sets
Big Data: tools and techniques for working with large data sets
 
Big Data
Big DataBig Data
Big Data
 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
CELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEM
 

Similaire à Data Management In Cellular Networks Using Activity Mining

Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
ambitlick
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
ncct
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Project
ncct
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projects
ncct
 
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
ncct
 
Software Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects DomainsSoftware Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects Domains
ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
ncct
 
Ieee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects DomainsIeee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects Domains
ncct
 

Similaire à Data Management In Cellular Networks Using Activity Mining (20)

An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
A Study of Mobile User Movements Prediction Methods
A Study of Mobile User Movements Prediction Methods A Study of Mobile User Movements Prediction Methods
A Study of Mobile User Movements Prediction Methods
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile Queries
 
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based Services
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
 
thesis_abstract
thesis_abstractthesis_abstract
thesis_abstract
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
azd document
azd documentazd document
azd document
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...
 
Context aware applications
Context aware applicationsContext aware applications
Context aware applications
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Project
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projects
 
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
 
Software Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects DomainsSoftware Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects Domains
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Ieee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects DomainsIeee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects Domains
 

Plus de IDES Editor

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 

Plus de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Data Management In Cellular Networks Using Activity Mining

  • 1. ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011 Data Management In Cellular Networks Using Activity Mining Dr. R. Ramachandran, Ph.D. Principal Dept. of CSE,SVCE Chennai, India rrama@svce.ac.in V. Aishwaryalakshmi PG Scholar Dept. of CSE, SVCE Chennai, India neefavenkat@gmail.com Abstract— In the recent technology advances, an increasing locations or service distribution. The regularity in service number of users are accessing various information systems invocation may come from the dependencies between services via wireless communication. The majority users in a mobile or the proximity of service providers. It is potentially beneficial environment are moving and accessing wireless services for to discover such mobility and service patterns to make easy the activities they are currently unavailable inside. We network and data management. We propose the idea of complex propose the idea of complex activity for characterizing the activity for characterizing the continuously changing complex continuously changing complex behavior patterns of mobile users. For the purpose of data management, a complex activity behavior patterns of mobile users. A complex activity is a is copy as a sequence of location movement, service requests, sequence of location movement, service requests, the the coincidence of location and service, or the interleaving of coincidence of location and service, or the interleaving of all all above. An activity may be composed of sub activities. above. An activity may be composed of sub activities. Different Different activities may exhibit dependencies that affect user activities may show dependencies that affect user behaviors. behaviors. We argue that the complex activity concept provides We argue that the activity concept provides a more specific, a more specific, rich, and detail description of user behavioral rich, and detail description of user behavioral patterns which patterns which are very useful for data management in mobile are very useful for data management in mobile environments. environments. Correct exploration of user activities has the Proper exploration of such activities enables data management possible of providing much higher quality and personalized services to individual user at the right place on the right time. system to predict the user’s next move, intended service or We, therefore, propose new methods for complex activity both for providing much higher quality and personalized mining, incremental maintenance, online detection and services to individual user at the right place on the right time. proactive data management based on user activities. In Such kind of advanced information services call for new particular, we develop pre-fetching and pushing techniques methods of complex activity mining, incremental maintenance, with cost sensitive control to make easy analytical data online detection, and proactive data management based on allocation. First round implementation and simulation results user activities. We propose new pattern mining and patterns shows that the proposed framework and techniques can processing algorithms to the discovery and maintenance of significantly increase local availability, conserve execution complex activities in mobile environments. Furthermore, we cost, reduce response time, and improve cache utilization. develop pre-fetching, pushing, and handoff techniques with Keywords-Activity mining, Prefectching,,pushing, proactive cost sensitive control to make easy predictive data allocation data management, Genetic Algorithm; and personalized services. Preliminary implementation and simulation results demonstrate that the activity-based I. INTRODUCTION proactive data management strategies can significantly conserve execution cost, reduce response time, improve cache Diverse mobile services and development in wireless utilization, and increase local availability. networks have stimulated an enormous number of people to employ mobile devices such as cellular phones and portable II. RELATED WORK laptops as their communications means. The most salient feature of wireless networks is mobility support, which enables mobile It has been known for quite sometime that user behavior users to communicate with others regardless of location. patterns are important for effective mobile computing. The Majority of users in a mobile environment do not travel at random. First stage along this line of research is the acquisition of They navigate from place to place with specific purposes in user behavior. Among the various methods for learning user mind. In many cases, the patterns of location movement and behavior, data mining is probably the most widely used service invocation of mobile users targeting similar purposes technique. It is well suited for discovering hidden patterns show strong similarity. The common patterns of location from large volume of data such as transaction log. The mining movement may due to geographic relationships between of mobility patterns, in particular focus attention of some previously proposed work. 38 © 2011 ACEEE DOI: 01.IJIT.01.02.512
  • 2. ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011 User Mobility Profile (UMP) is a combination of historic III. COMPLEX ACTIVITIES records and predictive patterns of mobile terminals, which A. Behavior pattern serves as fundamental information for mobility management and enhancement of Quality of Service (QoS) in wireless We analyze the user behaviour patterns in Mobile multimedia networks. UMP framework is developed for environments and formally characterize the idea of complex estimating service patterns and tracking mobile users, activities. Users in a mobile environment travel from one including descriptions of location, mobility, and service place to another. The moving pattern of a user can naturally requirements. For each mobile user, the service requirement be modelled as sequences of locations visited by the user. is estimated using a mean square error method. Moreover, a Mobile users also invoke services one after another when new mobility model is designed to characterize not only travelling. Service patterns emerge if a sequence of services stochastic behaviors, but historical records and predictive is repeatedly invoked by the same or different user. Some future locations of mobile users as well. Therefore, it services are offered only at specific locations such as gas incorporates aggregate history and current system parameters stations, restaurants, movie theatres, etc. In such cases, to acquire UMP. In particular, an adaptive algorithm is locations and service invocations always come in pairs. Based designed to predict the future positions of mobile terminals on the Analysis above, we can characterize the basic user in terms of location probabilities based on moving directions behaviour Patterns into three categories: and residence time in a cell. The authors G. Resta and P. Location-only patterns (L-type): Sequences of locations Santi,.[1] have proposed their schemes about User Behavior Those are repeatedly visited by mobile users. model approach in mobile environments and I.F. Akyildiz Service-only patterns (S-type): Sequences of services Those and W. Wang,[2] describes “The Predictive User Mobility are repeatedly invoked by mobile users. Profile Framework for Wireless environments. Location-service patterns (LS-type): Sequences of Location- R.V. Mathivaruni and V.Vaidehi[3] proposes An activity service pairs that are repeatedly visited and invoked by mobile based mobility prediction strategy using markv modeling for users. Location-only patterns occur when users are engaged wireless networks which describes the foremost objective in Movement activities that are formed by geographical of a wireless network is to facilitate the communication of Constraints. Service-only patterns arise when users are mobile users regardless of their point of attachment to the embarked on invocation activities that are formed by service network. The system must discern the location of the mobile dependencies. Location-service patterns are commonly seen terminal, to afford flawless service to the mobile terminal. when there are strong associations between location and Mobility prediction is widely used to assist handoff Service pairs. Sometimes, patterns are the result of personal management, resource reservation and service pre habits. These patterns constitute the primitive activities in configuration. Prediction techniques that are currently used Mobile environments. Built on top of primitive activities, a don’t consider the motivation behind the movement of mobile complex activity can be a combination of any number of nodes and incur huge overheads to manage and manipulate primitive or other complex activities as sub activities. Complex the information required to make predictions. This paper activities: A complex activity A ={a1,a2..} is a frequently proposes an activity based mobility prediction technique that occurring sequence of activities such That each ai is either a uses activity prediction and Markov modeling techniques to primitive or a complex activity. Based on the recursive devise a prediction methodology that could make accurate definition, a primitive activity is Considered as the simplest predictions than existing techniques. type of complex activity. Therefore, the term activity is used On The effect of group mobility to data replication in Ad- when there is no need to Distinguish between them.. We hoc networks: In this paper, we address the problem of replica argue that the notion of Complex activities hold the key to allocation in a mobile ad-hoc network by exploring group effective data management in mobile environments for several mobility. We first analyze the group mobility model and derive reasons: Complex activities can be used to faithfully model several theoretical results. In light of these results, we propose User behaviour in mobile environments. By identifying the a replica allocation scheme to improve the data accessibility. current activity of a mobile user, we can predict his/her next A. Yamasaki, H. Yamaguchi, S. Kusumoto, and T. Higashino move on both location and service invocation with much [4] design a Mobility-aware Data management (MoDA) higher accuracy than traditional way of relying on motion scheme for mobile ad hoc networks (MANETs) composed by estimation and accumulated read/write statistics. Once the mobile nodes such as urban pedestrians and vehicles. By user behaviour can be predicted with high Accuracy, it fully utilizing the knowledge about the trajectories of mobile becomes possible to provide proactive Services for the user. nodes, MoDA determines how replicas of data are copied In other words, we can allocate the required data items and and transferred among mobile nodes to provide the required reserve the necessary Resources at the right place on the data accessibility. Experimental results have shown that right time. MoDA could achieve the small number of data transfers B. Service Architecture among mobile nodes while keeping reasonable accessibility. Activity mining is the characterizing of continuously changing complex behavior patterns of mobile users. Our algorithm for activity mining is based on the popular Apriori algorithm to identify all primitive and complex activities of a user behavior. The activities identified by the mining algorithm 39 © 2011 ACEEE DOI: 01.IJIT.01.02. 512
  • 3. ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011 do not have any structure information except for sequences. Input: t = {a1; a2; . . . ; an} is a transaction and The relationships between activities are not clear. They are c = {c1; c2; . . . ; cm} is an activity candidate. not well suited for activity processing and data management. if c ==0 ; then return True; For this purpose we devise an efficient data structure named if n < m then return False; as activity tree for the representation and incremental for (i = 1; i d”n –m, 1++) do maintenance of activities. After successful identification of if action Activity Match{ ai; c1} ^ activity patterns, we still need to recognize the current activity contain Activity{ aiþ1; . . . ; an}, {c2; . . . ; cm} then of a user. Once the activity of a user can be detected and return True; prioritized, we are all set for presenting the proactive data end management techniques namely Return False; (a) Proactive pushing Function action Activity Match (a, c) (b) Predictive handoff Input: a is an action and c is a primitive activity. (c) Precision pre fetching If c:location ‘“ null ^ c:service‘“ null then Once the user behavior can be predicted with high accuracy, Return a:location ==c:location ^ a:service == c:service; it becomes possible to provide Proactive services for the else if c:location ‘“ null then user. In other words, we can allocate the required data items return a:location == c:location; and reserve the necessary resources at the right place on the else right time. To facilitate such an activity-based proactive data return a:service == c:service; management services, several issues must be properly C. Proactive Datamangement addressed. These issues, in turn, pose significant challenges to information system designers and service providers. Proactive data management can contain following steps Activity mining: We must be able to unearth the complex  Activity detection activities from large volumes of user behavior logs. This  Activity weighting and ranking naturally demands effective algorithms for data analysis and  Data management strategies activity mining.  Activity maintenance Activity representation: Once the activities are identified, In the Activity Detection, User maintains the activity table we need efficient structures for representing the activities to that store the current move of the user from the activity tree facilitate effective data management. index. In the Activity Weighting and Ranking, Ranking the Activity maintenance: Due to highly transient nature of mobile possible move of the user by use of environments, complex activities evolve dynamically over 1. Service distance(d) time. This calls for incremental maintenance techniques that 2. Service data size(t) can smoothly adapt to the changes. 3. Intensity(ρ) Activity detection: After successful identification of activity 4. Conformance ratio(γ) patterns, we still need to recognize the current activity of a 5. Degree of sharing(w) user. The online detection techniques must be very efficient. 6. Minimal co occurrence(m) Otherwise, we may run the risk of late identification of an In the data management strategies, we can find how to data activity that a user is no longer engaged i transfer and maintenance, that is If cell provide L only- Proactive data management: To provide effective information proactive pushing. Else If cell provide S only- Predictive services, proactive or predictive data management techniques handoff else If cell provide L & S-Precision pre fetching are highly desirable with the knowledge of a user’s possible In the Activity Maintenance, they Update the behavior details next move or service invocation. The algorithm used is given in the behavior table. For an activity a and the set of sharing below: nodes W, we define the activity score of a as follows: Function apriori_ gen (Ak_1) a.score=(d×t)(“ai(λ(ai)×α(parent(ai))m))/W Ck =0 ; Once the activity of a user can be detected and prioritized, for p 2 Ak_1 do we are all set for presenting the proactive data management for q 2 Ak_1 do techniques. In general, when a user is recognized to be if p:item1 =q:item1 ^ . . . ^ p:itemk_2 = q:itemk_2 ^ engaged in an activity, we can predict with high probability p:itemk_1 ‘“=q:itemk_1 then the user’s next move (including location and/or service Ck þ= q:itemk_1; invocation). end Proactive pushing—When the next move of a user is a end service-only activity, we know what the user is likely to invoke for c 2 Ck do but don’t know where he/she is heading. Therefore, it is for {k “1]-subsets s of c do potentially beneficial to push the service data directly to the if s € Ak_1 then delete c from Ck; client cache such that it is immediately available when the end service is actually invoked. end Predictive handoff—When the next step is a location-only return Ck; activity, we know where the user is going with no knowledge Function contain Activity (t, c) of the service invocation. 40 © 2011 ACEEE DOI: 01.IJIT.01.02. 512
  • 4. ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011 Precision pre fetching—If the next activity is a location mechanism that, based on the rewards received, select which service pair, we know exactly the user’s next move and what strategy should be applied at the given moment of the search. service the user is going to invoke.. With the strategies in Suppose we have K > 1 strategies in the pool A = {a1, · · · , mind, selecting proper data management operations becomes aK} and a probability vector P(t) = {p1(t), · · · , pK(t)} straightforward. For a user engaged in a complex activity, we check the activity tree to retrieve the next activity. If it is a service-only activity, we proactively push the service data In this work, the PM (Probability Matching) technique is toward the user. If it is a location-only activity, we contact used to adaptively update the probability pa (t) of each the base station of the predicted location and send out the strategy a based on its known performance (frequently data used by the current service. Finally, if it is a location- updated by the rewards received). Denote ra (t) as the reward service pair, we inform the base station of the next location to that a strategy a receives after its application at time t. qa (t) initiate the pre fetching of the predicted service data. is the known quality (or empirical estimate) of a strategy a, D Cost sensitive Operation that is updated as follows qa(t + 1) = qa(t) + α[ra(t) . qa(t)] Even with careful activity identification and proper data management operation selection, it may not be always cost Where is the adaptation rate. Based on this quality effective to apply the selected operations. The purpose of estimate, the PM method updates the probability pa (t) of cost-sensitive operation control is to judiciously estimate applying each operator as follows the relative cost and benefit before applying the operations. They are only performed when the expected saving is higher than the management overhead. For proactive pushing, we push the predicted service data directly to the client cache. Where pmin (0, 1) is the minimal probability value of each The pushing cost is, therefore, the service data transfer cost strategy, used to ensure that no operator gets lost. from the source to the client as follows: S(fd+1) If the prediction is correct, the user’s request can be satisfied immediately without further delay or cost. However, with probability 1"α, we may need the extra cost of waiting and transferring the data of the service actually invoked by the user when the prediction is wrong. This can be characterized as follows: (1-α)((D+R/Bf d+R/Bt)λ+R(fd+l) Since α can be estimated by the conformance rate while C, D, and T can also be measured once the service data are identified, can be used for controlling the application of the proactive pushing strategy.Degree of sharing, a data management operation can benefit many users at the same time which provides a form of consideration on overall system. B. Combining Road and Ring topology Thus system intergration. Topology information and mobility prediction are main distinction between the proposed algorithms and is IV. PROPOSED WORK exploitation of road topology map of the destination hotspot A. Adaptive Genetic Selection Metastatergies: within a cellular network. Road network topology is represented by a stochastic finite state machine that is Met strategies for Adaptation that is quickly adjust the adopted directly from the digital map. Every edge in the map system when the situation changes, by making use of is represented by one state ki for each driving direction. Adaptive generic algorithm to predict user next move further Road topology is reorganization and management of node accurately. One more inclusion is activity prioritization that parameters and modes of operation from time to time to modify we can provide first priority to more important service than the network with the goal of extending its Lifetime while others in the complex user behavior. On the Adaptive Strategy preserving other important characteristics. A ring network is Selection (AdapSS), in the Genetic Algorithms community, a network topology in which each node connects to exactly its objective is to automatically select between the available two other nodes, forming a single continuous pathway for possibly ill-known mutation strategies, according to their signals through each node - a ring. performance on the current search/optimization process. To do so, there is the need for two components: the credit C. Prefecting techniques: assignment, that defines how the impact of the strategies on Mobility prediction is an important maneuver that the search should be assessed and transformed into a determines the location of the mobile terminal by carefully numerical reward; and the strategy (or operator) selection manipulating the available information. The prediction 41 © 2011 ACEEE DOI: 01.IJIT.01.02.512
  • 5. ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011 accuracy depends on the user movement model and the not as a physical distance. The nodes of a zone are divided prediction algorithm used. Two different techniques are into peripheral nodes and interior nodes. Peripheral nodes already available for mobility prediction. First technique uses are nodes whose minimum distance to the central node is the historical movement patterns of the user to predict the exactly equal to the zone radius.The nodes whose minimum user’s whereabouts in future. The second technique uses distance is less than n are interior nodes. The nodes A–F are the contextual knowledge. So, An adaptive algorithm is interior nodes; the nodes G–J are peripheral nodes and the designed to predict the future positions of mobile terminals node K is outside the routing zone. Note that node H can be in terms of location probabilities based on moving directions reached by two paths, one with length 2 and one with length and residence time in a cell. It makes use of LAR and DREAM 3hops. The node is however within the zone, since the routing technique to find the future mobile states of positions shortest path is less than or equal to the zone radius. The respectively. number of nodes in the routing zone can be regulated by adjusting the transmission power of the nodes. Lowering the D. Propsed Architecture:Algorithm power reduces the number of nodes within direct reach and vice versa. The number of neighboring nodes should be sufficient to provide adequate reach ability and redundancy. On the other hand, a too large coverage results in many zone members and the update traffic becomes excessive. Further, large transmission coverage adds to the probability of local contention. AZRP refers to the locally proactive routing component as the Adaptive IntrA-zone Routing Protocol (AIARP). The globally reactive routing component is named Adaptive IntEr-zone Routing Protocol (AIERP). AIERP and AIARP are not specific routing protocols. Instead, AIARP is a family of limited-depth, proactive link-state routing protocols. AIARP maintains routing information for nodes that are within the routing zone of the node. Correspondingly, AIERP is a family of reactive routing protocols that offer enhanced route discovery and route maintenance services based on local connectivity monitored by AIARP. The fact that the topology of the local zone of each node is known can be used to reduce traffic when global route discovery is needed. Instead of broadcasting packets, AZRP uses a Figure 1. Activity mining with metastrategies concept called border casting. Border casting utilizes the For performance evaluation, we have developed a suite of topology information provided by AIARP to direct query simulation tools using Java language on WinTel platform. request to the border of the zone. The border cast packet The layer architecture of the simulator is depicted The delivery service is provided by the Border cast Resolution simulation engine is a set of routines to carry out the Protocol (BRP). BRP uses a map of an extended routing zone operations designated by other modules. The mobile to construct border cast trees for the query packets. environment simulator is responsible for generating the Alternatively, it uses source routing based on the normal network topology, supported services, and user behaviours. routing zone. By employing query control mechanisms, route the users get their behaviour models from a behaviour pool. requests can be directed away from areas of the network that Each user has a number of behaviours to choose from at already have been covered. random. Each behaviour is associated with a lifetime. When the lifetime of all behaviours expires, a new set of behaviours V. CONCLUSION AND FUTURE WORK is requested from the pool. To keep the behaviours fresh, each model has a lifetime in pool to trigger the generation of We proposed Personalized activity mining and data new models. Behaviours are selected fromthe pool following management are expected to provide Even higher quality Zipf distribution. services then the proposed schemes. Obtaining rich Resource station and better equipped client services The cold start E. Implementation of ZRP and AZRP problem owing to the need for an initial behavior log DB The Adaptive Zone Routing Protocol, as its name implies, remains unsolved. We work on that by dynamic tree structure is based on the concept of zones. A routing zone is defined and association mining. The Activity Prioritization methods for each node separately, and the zones of neighboring nodes can be improved and enables improved service Quality. overlap. The routing zone has a radius expressed in hops. Different Management strategies used for exploring activities The zone thus includes the nodes, whose distance from the in mobile computing. AZRP can be regarded as a routing node in question is at most n hops, where the routing zone of framework rather than as an independent protocol. AZRP S includes the nodes A–I, but not K. In the illustrations, the reduces the traffic amount compared to pure proactive or radius is marked as a circle around the node in question. It reactive routing. Routes to nodes within the zone are should however be noted that the zone is defined inhops, immediately available. AZRP makes an extension for ZRP 42 © 2011 ACEEE DOI: 01.IJIT.01.02.512
  • 6. ACEEE Int. J. on Information Technology, Vol. 01, No. 02, Sep 2011 protocol that can adapt well to the complicated network with [3] J.-L. Huang and M.-S Chen, “On the Effect of Group Mobility nodes moving non-uniformly. AZRP utilizes the excellent to Data Replication in Ad-Hoc Networks,” IEEE Trans. Mobile performance of the hybrid-driven manner of ZRP and Computing, vol. 5, no. 5, pp. 492-507, May 2006. [4]R.V. Mathivaruni and V.Vaidehi” An Activity Based Mobility simultaneously overcomes the bad adaptability of ZRP which Prediction Strategy Using Markov Modeling for Wireless Networks” assumes each node move uniformly and presets the same Proceedings of the World Congress on Engineering and Computer zone radius. For the mobility of nodes is variable in the Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, practical networks, our future work may focus on the change USA of the zone radius aroused by the mobility change of nodes. [5] I.F. Akyildiz and W. Wang, “The Predictive User Mobility This will be more accordant with the reality. Profile Framework for Wireless Multimedia Networks,” IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1021-1035, Dec. 2004. REFERENCES [6] I.F. Akyildiz and W. Wang, “The Predictive User Mobility Profile Framework for Wireless Multimedia Networks,” IEEE/ACM [1] G. Resta and P. Santi, “WiQoSM: An Integrated Qos-Aware Trans. Networking, vol. 12, no. 6, pp. 1021-1035, Dec. 2004. Mobility and User Behavior Model for Wireless Data Networks,” [7] W.-S. Soh and H. Kim, “QoS Provisioning in Cellular Networks IEEE Trans. Mobile Computing, vol. 7, no. 2, pp. 187- 198, Feb. Based on Mobility Prediction Techniques,” IEEE Comm. Magazine, 2008. vol. 41, no. 1, pp. 86-92, Jan. 2003. [2] A. Yamasaki, H. Yamaguchi, S. Kusumoto, and T. Higashino, [8] W. Su, S.-J. Lee, and M. Gerla, “Mobility Prediction and Routing “Mobility-Aware Data Management on Mobile Wireless in Ad Hoc Wireless Networks,” Int’l J. Network Management, vol. Networks,” Proc. IEEE 65th Vehicular Technology Conf., pp. 679- 11, no. 1, pp. 3-30, Jan. 2001. 683, 2007 43 © 2011 ACEEE DOI: 01.IJIT.01.02.512