SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 5, October 2018, pp. 3112~3117
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5.pp3112-3117  3112
Journal homepage: http://iaescore.com/journals/index.php/IJECE
A Study of Mobile User Movements Prediction Methods
J. Venkata Subramanian1
, S. Govindarajan2
1
Department of Computer Applications, SRM Institute of Science & Technology, India
2
Department of EDP, SRM Institute of Science & Technology, India
Article Info ABSTRACT
Article history:
Received Oct 10, 2017
Revised Feb 6, 2018
Accepted Sep 14, 2018
For a decade and more, the Number of smart phone users count increasing
day by day. With the drastic improvements in Communication technologies,
the prediction of future movements of mobile users needs also have
important role. Various sectors can gain from this prediction.
Communication management, City Development planning, and location-
based services are some of the fields that can be made more valuable with
movement prediction. In this paper, we propose a study of several Location
Prediction Techniques in the following areas.Keyword:
Comparison
Data mining
Location prediction
Tracking
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
J.Venkata Subramanian,
Department of Computer Applications,
SRM Institute of Science & Technology,
Kattankulathur – 603 203, Chennai, India.
Email: jvenkatmail@gmail.com
1. INTRODUCTION
In Personal Communication Systems, the wireless technologies were boomed about more than 10
years, To get the successful communication between humans, the usage of cellular phones are very much
important. The mobile phone users always need various services from the service providers. Almost all
service providers assuring the Quality Of Service to their customers in all around the world. In a coverage
area of any service provider, thousands of users availing the communication services from the providers at a
same time. To provide better quality of services to the customers, the companies, implements and follows
various techniques for management of locations in their own coverage area and help to the government.
The coverage area, the entire geographical space has been divided into the hexagonal shaped cells.
For example, a particular user can travel almost in a same route from his home to office every day. With this
trajectory of user, the route has been recorded in the database in a period of time, and also the route involved
cells and neighborhood cells also recorded. With these historical movements, we can predict the future
movements also. So we can provide better quality of services to the users.
2. COMPARISION
In this paper, we have compared, several methods used by various authors in the following fields of
research areas.
2.1. Local Linear Regression Model
The Authors [1] used Statistical method namely local linear regression model. They propose short
memory adaptive location predictor having adaptation capability which has been achieved through fuzzy
Int J Elec & Comp Eng ISSN: 2088-8708 
A Study of Mobile User Movements Prediction Methods (J. Venkata Subramanian)
3113
controller. The experiments conducted with real GPS data. The local regression model based on kernel
weighted functions to determine user’s future location using extrapolation.
2.2. Location and Trajectory Information Model
The another model used by authors [1] are, location and trajectory information model in which the
location of user at time t can be represented by 2D vector, the exact position can be predicted. The
Performance of Location Prediction assessed by real GPS values.
2.3. Spatial Context Classifier and Short-term Predictor
The authors [2] proposed an efficient spatial context classifier and a short-term predictor for the
future location of a mobile user in mobile phone networks. In this paper, the authors adopted pattern namely
classification in order to predict the future location of a mobile user based on the spatial context i.e.,
a. the current position and direction of the user,
b. the history of the trajectories followed by the user, and
c. the information on the user’s surroundings (neighboring network cells).
The authors analyzed the previous Naïve basis classification and found the difficulties in handling semi
random and fully random movement patterns. For classification, the following three types methods used.
a. Non Parametric trajectory classifier
b. Non metric trajectory classifier
c. Multi expert trajectory classifier
For location prediction, Macro cell based location predictor and Micro location predictor with their
types were used. The Qualitative and quantitative assessments have done for performance evaluation.
Simulations with synthetic and real-world mobility data shown that the proposed short-term Micro Direction
based Location predictor got high prediction efficiency and accuracy, Therefore delivering LPs suitable for
advanced context-aware applications.
2.4. Movement Prediction Framework
In this paper, the authors [3] mainly focused the location prediction during emergencies. The found
the user’s behaviors are changed in-case of emergency. A new movement prediction framework has been
framed in Wireless LAN The users are aware of their locations using the GPS and velocities from the
successive locations. Moreover, the users are also aware about the other users. For simulation, around 50
users movements were evaluated. The prediction accuracy level they achieved nearly 100%.
2.5. Cluster-based Temporal Mobile Sequential Pattern Mining
The Algorithm used by Authors [4] is CTMSP-Mine along with Cluster object based smart cluster
Affinity Search Technique and assessed with Location based Service Alignment. After Creating patterns, to
predict the user behavior and recommending services. For simulation, the authors used Matlab. The
following data processing methods also used they are pick mix, sampling, partitioning, field reordering etc.,
Get Number of time Segmenting Points Algorithm used to find the user behaviours in various time segments.
2.6. Association Rules
The Authors [5] selected the well known Association Rules from Data Mining to find the solutions
for Mobility Prediction and Location Management. In Association Rules, the available hidden links between
data, the prediction can be made excellent. They have taken a small coverage area (Ex.Waterloo) and
separated into 45 hexagonal cells. Using the movements Simulator, the Predictions made. The Authors got
around 90% of accuracy level.
2.7. Genetic Algorithm and Ant Colony Optimization
Using the above two algorithms[6], there are two different algorithms proposed to determine the
total distance based on finding maximum flow in wireless networks and generate pheromone matrix of ants
and estimate the content of the path using neighborhood that the user have not been visited in the particular
networks. The authors were evaluated to optimize the location of controllers in wireless networks and
compared with greedy algorithms.
2.8. Clustering based Sequential Pattern Mining & Sequential Pattern Mining based Clustering
The authors [7], first analyses about Sequential Pattern Mining and Clustering techniques and their
deficiencies. So, They proposed the following two algorithms namely.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3112 - 3117
3114
2.9. Clustering based Sequential Pattern Mining
This model aims to utilize the analogous movement characteristics of mobile users to deal with the
deficiency of mobility behaviors of individuals. By using such similar mobility behaviors, the model may
given the estimating future movement of a new user or historical user. This model has not discarded random
movements from mobile users’ histories before clustering mobility behaviors into similar groups. The authors
generated a dataset with only 5 movement behaviors.
2.10. Sequential Pattern Mining based Clustering
This model mainly concentrated on eliminating noise of random movements in users’ histories to
improve the quality of generated groups of similar mobility behaviors. And also this model found the
movement group to which the current trajectory belongs and then extracts all mobility rules from this group.
The next location of the current trace is selected based on its best matching regulation. The authors concluded
the combination of above models will give the accurate prediction of movements.
2.11. Object Tracking Algorithm
The Object Tracking Algorithm [8] found from the combination of Fuzzy logic and Neural
Networks. Using Multi layer perceptron the proposed approach was evaluated in MatLAB environment. With
the help of small dataset the predictions were made by authors. For handling the imprecision data, they used
the concept of Fuzzy Logic. The Author achieved 80% of Accuracy Level from the dynamic training of
Special Neural Network.
2.12. Multi Agent System for Movement Analysis
The System was developed by the authors [9], to find out the location prediction in Mobile
Networks. The authors used MIT Reality Mining Dataset with a sample of 10 selected participants.
Movement Record Analysis taken for analyzing find out the stationary locations, i.e., the significant time
staying in the significant places with probable locations of users. To estimate the location probabilities, the
movement analysis and location prediction were needed.
The System works under the center point of the coordinator agent can able to manage the flow of
required jobs and contact with other agents. There are two predictors are used by authors, if the movements
are regular we need neural network based predictor. On the other hand, if irregular, we need probability
based predictor. The accuracy obtains high , when probable location of 3 neighboring locations.
2.13. Markov based Methods
There are three methods were analyzed by authors [10]. They are Markov based methods, social
Analysis based methods and Hybrid methods. In Markov based methods, The mobility history of users is
collected both at inter-cell level with the help of cell id and also by using GPS at intra-cell level. With the
help of Second order Markov Predictor for both spatial movements and temporal behavior, Prediction takes
place. They show results around 76% of accuracy when compared to GPS Positioning.
2.14. Social Analysis based Methods
In the Social Analysis based methods, will deliver a location prediction system in cloud. based on
movement pattern discovery and analysis. They have merged the Location estimation and social information
by analyzing the time between two users make a cell and the time they are located in the same cell. The result
will be the format of table contains relevant locations sorted by the probability of visiting. The prediction was
evaluated by the Dataset. Regarding the precision, listed out from 1st
hour to 6th
Hour.
2.15. Hybrid Method
The next Hybrid method, the prediction made as a Service for improve applications as mobility
aware personalization and predictive resource allocation. These methods combines the early markov methods
and collective behavioral patterns. The MPaaS Scheme evaluation proving with positively influence the
markov based predictors. Here the authors were got only around 30% of accuracy for the first 6 hours.
Whereas the next 6 hours with high regularity the accuracy around 70%.
Int J Elec & Comp Eng ISSN: 2088-8708 
A Study of Mobile User Movements Prediction Methods (J. Venkata Subramanian)
3115
Table 1. Comparison Study of Various Mobile Prediction Methods
Sl.No. Authors and Year
Approach /
Methods Used
Training Dataset
Used
Area
Environment
(Campus/Public)
1.
Theodoros Anagnostopoulos, Christos
Anagnostopoulos
& Stathes Hadjiefthymiades 2010
Local linear
regression model
With Real GPS
Traces
Statistical and
Fuzzy Control
Public
Location and
trajectory
information model
2.
Theodore Anagnostopoulos, Christos
Anagnostopoulos, & Stathes
Hadjiefthymiades 2012
Spatial context
classifier
MIT Reality
Mining Dataset
Pattern
Classification
Public (Home to
Campus and
Campus to
Home)
3.
Nusrat Ahmed Surobhi
&
Abbas Jamalipour 2012
Movement
Prediction
Framework
50 Nos. of Mobile
users
Network
Communication
Indoor(WLAN
based Machine to
Machine
Network)
4.
Sandhya Avasthi, Avinash Dwivedi
2013
Cluster-Based
Temporal Mobile
Sequential Pattern
Mining
--- Data Mining ---
5.
Rachida Aoudjit, Malika Belkadi,
Mehammed Daoui, Lynda Chamek,
Sofiane Hemrioui &
Mustapha Lalam 2013
Association Rules
A small no. of
users movements
were recorded by
simulator database
Data Mining
Public ( A Small
Area of
Waterloo)
6. Dac-Nhuong Le 2013
Genetic
Algorithm & Ant
Colony
Optimization
10 Nos. of
optimal location
of controller
problem Instances
Wireless
Networks
--
7.
Thuy Van T. Duong
&
Dinh Que Tran 2015
Clustering based
Sequential Pattern
Mining
5 initialized
movement
behaviours
Data Mining Public
Sequential Pattern
Mining based
Clustering
8. Jawdat Jamil Alshaer 2015
Object Tracking
Algorithm
70 Randomly
sampled locations
created by author
Fuzzy Logic
and Neural
Networks
Public
9.
Marin Vukovic
&
Dragan Jevtic
Multi Agent
System for
Movement
Analysis
MIT Reality
Mining Project
Neural Network Public
10.
Cristian L. Leca, Leontin Tută,
Ioan Nicolaescu
& Cristian I. Rîncu 2015
Markov based
methods
MIT Reality
Mining Project
Statistical and
Networks
PublicSocial Analysis
based method
Hybrid method
11.
Haitao Zhang, Zewei Chen, Zhao Liu,
Yunhong Zhu, &
Chenxue Wu 2016
Rough Prediction
and Accurate
Prediction
KAnonymity
Dataset created
from Google
Maps, Foursquare,
BaiduMaps, etc
Data Mining Public
12.
Sungjun Lee, Junseok Lim, Jonghun
Park & Kwanho Kim 2016
Spatio-temporal
Periodic Pattern
714,448WiFi
signal logs around
50 Days
Data Mining
Campus of Seoul
National
University
13.
Ahmed Azeez Khudhair, Saba Qasim
Jabbar, Mohammed Qasim
Sulttan
&
Desheng Wang
2016
triangulation,
fingerprinting,
proximity, vision
analysis and
trilateration
Some Indoor
Localization
Systems
Wireless
Systems
Indoor
14.
V.Nivedha,
E. Karunakaran
& J.Kumaran@Kumar 2017
Approximate
Multiple
alignment pattern
mining
--- Data Mining Public WLANS
15.
Sushil Kumar Verma, R.S. Thakur
& Shailesh Jaloree 2017
Fuzzy Association
Rule Mining
204 Students
Records
Data Mining
Samrat Ashok
Technological
Institute, Vidisha,
Madhya Pradesh,
India
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3112 - 3117
3116
2.16. Rough Prediction and Accurate Prediction
The basic theory of Location Based System queries and the primitives of Location Based System
privacy were introduced. Samples of anonymity datasets adopted by a typical method of spatial-temporal
k-anonymity were explained. For predicting the locations, the following steps were proposed by
authors [11].
a. Extracting sequential rules from anonymity datasets
b. Building transition probability matrices from the mined sequential rules;
c. Normalizing the transition probabilities
d. Calculating n-step transition probability matrices
e. Crafting a rough prediction method and an accurate prediction method based on the n-step transition
probability
The Predictions were evaluated by the two types of experiments, In the Exp.1, accurate prediction
finds from the detailed paths obtained by using the Algorithm which gets inputs as simple paths of mobiles.
Whereas in the Exp.2, verify the correctness of the proposed Location prediction methods.
2.17. Spatio-temporal Periodic Pattern
The above pattern [12] was used for capture the visits of the places of mobile users in different
timings and different days, based on the past visits, the future visit will be predicted. The authors were
experimented with real data set of the students of Seoul National University. The GPS and WIFI were acted
as recorders of the user visits. And also smart phones involved. The experiments implemented by first order
markov chain methods.
2.18. Triangulation, fingerprinting, proximity, vision analysis and tri-lateration Techniques:
The authors [13] measured the above five local prediction approaches, and estimated the
performance in-terms of Accuracy, Robustness, Cost, Scalability and complexity. Their characteristics of
indoor localization systems were listed. In the above study, the authors considered about the continuously
tracking people between indoor and outdoor environments.
2.19. Approximate Multiple Alignment Pattern Mining:
The authors [14] combined Clustering and Sequential Pattern Mining techniques found the
Approximate Multiple Alignment Pattern Mining technique that used quality rules and discovered from
various similar user behaviors. The authors found Location Prediction based on individual Movement History
and Multiple user movements histories.
2.20. Fuzzy Association Rule Mining:
By using the above method, the authors [15] were evaluated the performance of two sets of students
and predicted the performance in end of the semester of their course based on the previous academic
performance likely attendance, internal marks etc., and found the revision of curriculum and all.
3. CONCLUSION
In the above study, many authors used data mining techniques to find the locations of the
movements of the mobile users. But, the Data Mining techniques having two drawbacks, the first is, they
may fail to predict new users or users with movement on novel methods. Second, reduction in accuracy for
regular movement and random movements having similar quality behaviors of mobile users. To overcome
this situation, Researchers can choose Neural Networks for getting accuracy and exact prediction of
Locations.
REFERENCES
[1] Theodoros Anagnostopoulos, Christos Anagnostopoulos & Stathes Hadjiefthymiades, An adaptive location
prediction model based on fuzzy control, Computer Communications,Elsevier (2010),Vol 34, pp.814-834.
[2] Theodoros Anagnostopoulos, Christos Anagnostopoulos & Stathes Hadjiefthymiades, Efficient Location Prediction
in Mobile Cellular Networks, International Journal of Wireless Information Networks, Springer (2012), Vol-19,
pp.97-111.
[3] Nusrat Ahmed Surobhi & Abbas Jamalipour, Movement Prediction of Mobile Users inEmergencies Using M2M
Networks, IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications,
(2012)pp.2535-2540.
[4] Sandhya Avasthi, Avinash Dwivedi, Prediction of Mobile user Behavior using Clustering, International Journal of
Scientific and Research Publications,(2013), Vol. 3, Issue 2, pp.1 – 5.
Int J Elec & Comp Eng ISSN: 2088-8708 
A Study of Mobile User Movements Prediction Methods (J. Venkata Subramanian)
3117
[5] Rachida Aoudjit, Malika Belkadi, Mehammed Daoui, Lynda Chamek,Sofiane Hemrioui & Mustapha Lalam,
Mobility Prediction Based on Data mining, International Journal of Database Theory and Application, (2013), Vol.
6, No. 2, pp.71-78.
[6] Dac-Nhuong Le, (2013), GA and ACO Algorithms Applied to Optimizing Location of Controllers in Wireless
Networks, International Journal of Electrical and Computer Engineering, Vol. 3, No. 2, pp. 221~229
[7] Thuy Van T. Duong & Dinh Que Tran, A Fusion Of Data Mining Techniques For Predicting Movement Of Mobile
Users, Journal of Communications and Networks,(2015), VOL. X, NO. Y, pp.1-14.
[8] Jawdat Jamil Alshaer, Mobile Object-Tracking Approach using a Combination of Fuzzy Logic and Neural
Networks, Global Journal of Computer Science and Technology ( E ), (2015), Vol. XV Issue VIII Ver. I Year,
pp.19-25.
[9] Marin Vukovic & Dragan Jevtic, Agent-based Movement Analysis and Location Prediction in Cellular Networks,
19th International Conference on Knowledge Based and Intelligent Information and Engineering
Systems(Elsevier), (2015),pp. 517 – 526 .
[10] Cristian L. Leca, Leontin Tută, Ioan Nicolaescu & Cristian I. Rîncu, Recent advances in location prediction
methods for cellular communication networks, IEEE 23rd
Telecommunications forum(2015), pp.1-5.
[11] Haitao Zhang, Zewei Chen, Zhao Liu, Yunhong Zhu, & Chenxue Wu, Location Prediction Based on Transition
Probability Matrices Constructing from Sequential Rules for Spatial-Temporal KAnonymity Dataset, PLOS ONE
Journal, (2016), pp. 1 – 22.
[12] Sungjun Lee, Junseok Lim, Jonghun Park & Kwanho Kim, Next Place Prediction Based on Spatiotemporal Pattern
Mining of Mobile Device Logs, MDPI (Sensors) Journal,(2016), pp.1-19.
[13] Ahmed Azeez Khudhair, Saba Qasim Jabbar, Mohammed Qasim Sulttan, Desheng Wang, Wireless Indoor
Localization Systems and Techniques: Survey and Comparative Study, Indonesian Journal of Electrical
Engineering and Computer Science, (2016), Vol. 3, No. 2, pp. 392 ~ 409
[14] V.Nivedha, E. Karunakaran & J.Kumaran@Kumar, A Novel Approach for Predicting Movement of Mobile Users
Based on Data Mining Techniques, International Research Journal of Engineering and Technology, (2017), Vol-4,
Issue – 4, pp 3603 – 3608.
[15] Sushil Kumar Verma, R.S. Thakur, Shailesh Jaloree, Fuzzy Association Rule Mining based Model to Predict
Students’ Performance, International Journal of Electrical and Computer Engineering, (2017), Vol. 7, No. 4, pp.
2223~2231.

More Related Content

What's hot

Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...JIEMS Akkalkuwa
 
Paper id 6122018109
Paper id 6122018109Paper id 6122018109
Paper id 6122018109IJRAT
 
Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...
Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...
Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...IOSR Journals
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleIAEME Publication
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...ijwmn
 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
IRJET- Fusion based Brain Tumor Detection
IRJET- Fusion based Brain Tumor DetectionIRJET- Fusion based Brain Tumor Detection
IRJET- Fusion based Brain Tumor DetectionIRJET Journal
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Alexander Decker
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESranjit banshpal
 
Flood Prediction Model using Artificial Neural Network
Flood Prediction Model using Artificial Neural NetworkFlood Prediction Model using Artificial Neural Network
Flood Prediction Model using Artificial Neural NetworkEditor IJCATR
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkIRJET Journal
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...ambitlick
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficTELKOMNIKA JOURNAL
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
 
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...IJAEMSJORNAL
 

What's hot (20)

Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
Review Paper on Shared and Distributed Memory Parallel Algorithms to Solve Bi...
 
B045041114
B045041114B045041114
B045041114
 
Paper id 6122018109
Paper id 6122018109Paper id 6122018109
Paper id 6122018109
 
Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...
Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...
Implementation of Fuzzy Logic for the High-Resolution Remote Sensing Images w...
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multiple
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and Approaches
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
IRJET- Fusion based Brain Tumor Detection
IRJET- Fusion based Brain Tumor DetectionIRJET- Fusion based Brain Tumor Detection
IRJET- Fusion based Brain Tumor Detection
 
C018141418
C018141418C018141418
C018141418
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
 
Flood Prediction Model using Artificial Neural Network
Flood Prediction Model using Artificial Neural NetworkFlood Prediction Model using Artificial Neural Network
Flood Prediction Model using Artificial Neural Network
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
 

Similar to A Study of Mobile User Movements Prediction Methods

Analytical framework for optimized feature extraction for upgrading occupancy...
Analytical framework for optimized feature extraction for upgrading occupancy...Analytical framework for optimized feature extraction for upgrading occupancy...
Analytical framework for optimized feature extraction for upgrading occupancy...IJECEIAES
 
Human activity recognition with self-attention
Human activity recognition with self-attentionHuman activity recognition with self-attention
Human activity recognition with self-attentionIJECEIAES
 
Draft activity recognition from accelerometer data
Draft activity recognition from accelerometer dataDraft activity recognition from accelerometer data
Draft activity recognition from accelerometer dataRaghu Palakodety
 
a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments marwaeng
 
TOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEMTOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEMIJARIIT
 
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...ijsrd.com
 
Cooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksCooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksJPINFOTECH JAYAPRAKASH
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningIDES Editor
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature ExtractionIRJET Journal
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesIJERA Editor
 
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET Journal
 
Spatio-Temporal Data Analysis using Deep Learning
Spatio-Temporal Data Analysis using Deep LearningSpatio-Temporal Data Analysis using Deep Learning
Spatio-Temporal Data Analysis using Deep LearningIRJET Journal
 
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...IJDKP
 
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...IJDKP
 
IRJET- Next Location Prediction
IRJET-  	  Next Location PredictionIRJET-  	  Next Location Prediction
IRJET- Next Location PredictionIRJET Journal
 

Similar to A Study of Mobile User Movements Prediction Methods (20)

Analytical framework for optimized feature extraction for upgrading occupancy...
Analytical framework for optimized feature extraction for upgrading occupancy...Analytical framework for optimized feature extraction for upgrading occupancy...
Analytical framework for optimized feature extraction for upgrading occupancy...
 
Human activity recognition with self-attention
Human activity recognition with self-attentionHuman activity recognition with self-attention
Human activity recognition with self-attention
 
Draft activity recognition from accelerometer data
Draft activity recognition from accelerometer dataDraft activity recognition from accelerometer data
Draft activity recognition from accelerometer data
 
MMekni Poster V0.2
MMekni Poster V0.2MMekni Poster V0.2
MMekni Poster V0.2
 
a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments
 
TOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEMTOURIST PLACE RECOMMENDATION SYSTEM
TOURIST PLACE RECOMMENDATION SYSTEM
 
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...
 
Cooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networksCooperative positioning and tracking in disruption tolerant networks
Cooperative positioning and tracking in disruption tolerant networks
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
IRJET-  	  Behavior Analysis from Videos using Motion based Feature ExtractionIRJET-  	  Behavior Analysis from Videos using Motion based Feature Extraction
IRJET- Behavior Analysis from Videos using Motion based Feature Extraction
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based Services
 
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
IRJET - A Review on Pedestrian Behavior Prediction for Intelligent Transport ...
 
Spatio-Temporal Data Analysis using Deep Learning
Spatio-Temporal Data Analysis using Deep LearningSpatio-Temporal Data Analysis using Deep Learning
Spatio-Temporal Data Analysis using Deep Learning
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
Ijsrdv7 i10842
Ijsrdv7 i10842Ijsrdv7 i10842
Ijsrdv7 i10842
 
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
 
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
APPLICABILITY OF CROWD SOURCING TO DETERMINE THE BEST TRANSPORTATION METHOD B...
 
IRJET- Next Location Prediction
IRJET-  	  Next Location PredictionIRJET-  	  Next Location Prediction
IRJET- Next Location Prediction
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

A Study of Mobile User Movements Prediction Methods

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 5, October 2018, pp. 3112~3117 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5.pp3112-3117  3112 Journal homepage: http://iaescore.com/journals/index.php/IJECE A Study of Mobile User Movements Prediction Methods J. Venkata Subramanian1 , S. Govindarajan2 1 Department of Computer Applications, SRM Institute of Science & Technology, India 2 Department of EDP, SRM Institute of Science & Technology, India Article Info ABSTRACT Article history: Received Oct 10, 2017 Revised Feb 6, 2018 Accepted Sep 14, 2018 For a decade and more, the Number of smart phone users count increasing day by day. With the drastic improvements in Communication technologies, the prediction of future movements of mobile users needs also have important role. Various sectors can gain from this prediction. Communication management, City Development planning, and location- based services are some of the fields that can be made more valuable with movement prediction. In this paper, we propose a study of several Location Prediction Techniques in the following areas.Keyword: Comparison Data mining Location prediction Tracking Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: J.Venkata Subramanian, Department of Computer Applications, SRM Institute of Science & Technology, Kattankulathur – 603 203, Chennai, India. Email: jvenkatmail@gmail.com 1. INTRODUCTION In Personal Communication Systems, the wireless technologies were boomed about more than 10 years, To get the successful communication between humans, the usage of cellular phones are very much important. The mobile phone users always need various services from the service providers. Almost all service providers assuring the Quality Of Service to their customers in all around the world. In a coverage area of any service provider, thousands of users availing the communication services from the providers at a same time. To provide better quality of services to the customers, the companies, implements and follows various techniques for management of locations in their own coverage area and help to the government. The coverage area, the entire geographical space has been divided into the hexagonal shaped cells. For example, a particular user can travel almost in a same route from his home to office every day. With this trajectory of user, the route has been recorded in the database in a period of time, and also the route involved cells and neighborhood cells also recorded. With these historical movements, we can predict the future movements also. So we can provide better quality of services to the users. 2. COMPARISION In this paper, we have compared, several methods used by various authors in the following fields of research areas. 2.1. Local Linear Regression Model The Authors [1] used Statistical method namely local linear regression model. They propose short memory adaptive location predictor having adaptation capability which has been achieved through fuzzy
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  A Study of Mobile User Movements Prediction Methods (J. Venkata Subramanian) 3113 controller. The experiments conducted with real GPS data. The local regression model based on kernel weighted functions to determine user’s future location using extrapolation. 2.2. Location and Trajectory Information Model The another model used by authors [1] are, location and trajectory information model in which the location of user at time t can be represented by 2D vector, the exact position can be predicted. The Performance of Location Prediction assessed by real GPS values. 2.3. Spatial Context Classifier and Short-term Predictor The authors [2] proposed an efficient spatial context classifier and a short-term predictor for the future location of a mobile user in mobile phone networks. In this paper, the authors adopted pattern namely classification in order to predict the future location of a mobile user based on the spatial context i.e., a. the current position and direction of the user, b. the history of the trajectories followed by the user, and c. the information on the user’s surroundings (neighboring network cells). The authors analyzed the previous Naïve basis classification and found the difficulties in handling semi random and fully random movement patterns. For classification, the following three types methods used. a. Non Parametric trajectory classifier b. Non metric trajectory classifier c. Multi expert trajectory classifier For location prediction, Macro cell based location predictor and Micro location predictor with their types were used. The Qualitative and quantitative assessments have done for performance evaluation. Simulations with synthetic and real-world mobility data shown that the proposed short-term Micro Direction based Location predictor got high prediction efficiency and accuracy, Therefore delivering LPs suitable for advanced context-aware applications. 2.4. Movement Prediction Framework In this paper, the authors [3] mainly focused the location prediction during emergencies. The found the user’s behaviors are changed in-case of emergency. A new movement prediction framework has been framed in Wireless LAN The users are aware of their locations using the GPS and velocities from the successive locations. Moreover, the users are also aware about the other users. For simulation, around 50 users movements were evaluated. The prediction accuracy level they achieved nearly 100%. 2.5. Cluster-based Temporal Mobile Sequential Pattern Mining The Algorithm used by Authors [4] is CTMSP-Mine along with Cluster object based smart cluster Affinity Search Technique and assessed with Location based Service Alignment. After Creating patterns, to predict the user behavior and recommending services. For simulation, the authors used Matlab. The following data processing methods also used they are pick mix, sampling, partitioning, field reordering etc., Get Number of time Segmenting Points Algorithm used to find the user behaviours in various time segments. 2.6. Association Rules The Authors [5] selected the well known Association Rules from Data Mining to find the solutions for Mobility Prediction and Location Management. In Association Rules, the available hidden links between data, the prediction can be made excellent. They have taken a small coverage area (Ex.Waterloo) and separated into 45 hexagonal cells. Using the movements Simulator, the Predictions made. The Authors got around 90% of accuracy level. 2.7. Genetic Algorithm and Ant Colony Optimization Using the above two algorithms[6], there are two different algorithms proposed to determine the total distance based on finding maximum flow in wireless networks and generate pheromone matrix of ants and estimate the content of the path using neighborhood that the user have not been visited in the particular networks. The authors were evaluated to optimize the location of controllers in wireless networks and compared with greedy algorithms. 2.8. Clustering based Sequential Pattern Mining & Sequential Pattern Mining based Clustering The authors [7], first analyses about Sequential Pattern Mining and Clustering techniques and their deficiencies. So, They proposed the following two algorithms namely.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3112 - 3117 3114 2.9. Clustering based Sequential Pattern Mining This model aims to utilize the analogous movement characteristics of mobile users to deal with the deficiency of mobility behaviors of individuals. By using such similar mobility behaviors, the model may given the estimating future movement of a new user or historical user. This model has not discarded random movements from mobile users’ histories before clustering mobility behaviors into similar groups. The authors generated a dataset with only 5 movement behaviors. 2.10. Sequential Pattern Mining based Clustering This model mainly concentrated on eliminating noise of random movements in users’ histories to improve the quality of generated groups of similar mobility behaviors. And also this model found the movement group to which the current trajectory belongs and then extracts all mobility rules from this group. The next location of the current trace is selected based on its best matching regulation. The authors concluded the combination of above models will give the accurate prediction of movements. 2.11. Object Tracking Algorithm The Object Tracking Algorithm [8] found from the combination of Fuzzy logic and Neural Networks. Using Multi layer perceptron the proposed approach was evaluated in MatLAB environment. With the help of small dataset the predictions were made by authors. For handling the imprecision data, they used the concept of Fuzzy Logic. The Author achieved 80% of Accuracy Level from the dynamic training of Special Neural Network. 2.12. Multi Agent System for Movement Analysis The System was developed by the authors [9], to find out the location prediction in Mobile Networks. The authors used MIT Reality Mining Dataset with a sample of 10 selected participants. Movement Record Analysis taken for analyzing find out the stationary locations, i.e., the significant time staying in the significant places with probable locations of users. To estimate the location probabilities, the movement analysis and location prediction were needed. The System works under the center point of the coordinator agent can able to manage the flow of required jobs and contact with other agents. There are two predictors are used by authors, if the movements are regular we need neural network based predictor. On the other hand, if irregular, we need probability based predictor. The accuracy obtains high , when probable location of 3 neighboring locations. 2.13. Markov based Methods There are three methods were analyzed by authors [10]. They are Markov based methods, social Analysis based methods and Hybrid methods. In Markov based methods, The mobility history of users is collected both at inter-cell level with the help of cell id and also by using GPS at intra-cell level. With the help of Second order Markov Predictor for both spatial movements and temporal behavior, Prediction takes place. They show results around 76% of accuracy when compared to GPS Positioning. 2.14. Social Analysis based Methods In the Social Analysis based methods, will deliver a location prediction system in cloud. based on movement pattern discovery and analysis. They have merged the Location estimation and social information by analyzing the time between two users make a cell and the time they are located in the same cell. The result will be the format of table contains relevant locations sorted by the probability of visiting. The prediction was evaluated by the Dataset. Regarding the precision, listed out from 1st hour to 6th Hour. 2.15. Hybrid Method The next Hybrid method, the prediction made as a Service for improve applications as mobility aware personalization and predictive resource allocation. These methods combines the early markov methods and collective behavioral patterns. The MPaaS Scheme evaluation proving with positively influence the markov based predictors. Here the authors were got only around 30% of accuracy for the first 6 hours. Whereas the next 6 hours with high regularity the accuracy around 70%.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  A Study of Mobile User Movements Prediction Methods (J. Venkata Subramanian) 3115 Table 1. Comparison Study of Various Mobile Prediction Methods Sl.No. Authors and Year Approach / Methods Used Training Dataset Used Area Environment (Campus/Public) 1. Theodoros Anagnostopoulos, Christos Anagnostopoulos & Stathes Hadjiefthymiades 2010 Local linear regression model With Real GPS Traces Statistical and Fuzzy Control Public Location and trajectory information model 2. Theodore Anagnostopoulos, Christos Anagnostopoulos, & Stathes Hadjiefthymiades 2012 Spatial context classifier MIT Reality Mining Dataset Pattern Classification Public (Home to Campus and Campus to Home) 3. Nusrat Ahmed Surobhi & Abbas Jamalipour 2012 Movement Prediction Framework 50 Nos. of Mobile users Network Communication Indoor(WLAN based Machine to Machine Network) 4. Sandhya Avasthi, Avinash Dwivedi 2013 Cluster-Based Temporal Mobile Sequential Pattern Mining --- Data Mining --- 5. Rachida Aoudjit, Malika Belkadi, Mehammed Daoui, Lynda Chamek, Sofiane Hemrioui & Mustapha Lalam 2013 Association Rules A small no. of users movements were recorded by simulator database Data Mining Public ( A Small Area of Waterloo) 6. Dac-Nhuong Le 2013 Genetic Algorithm & Ant Colony Optimization 10 Nos. of optimal location of controller problem Instances Wireless Networks -- 7. Thuy Van T. Duong & Dinh Que Tran 2015 Clustering based Sequential Pattern Mining 5 initialized movement behaviours Data Mining Public Sequential Pattern Mining based Clustering 8. Jawdat Jamil Alshaer 2015 Object Tracking Algorithm 70 Randomly sampled locations created by author Fuzzy Logic and Neural Networks Public 9. Marin Vukovic & Dragan Jevtic Multi Agent System for Movement Analysis MIT Reality Mining Project Neural Network Public 10. Cristian L. Leca, Leontin Tută, Ioan Nicolaescu & Cristian I. Rîncu 2015 Markov based methods MIT Reality Mining Project Statistical and Networks PublicSocial Analysis based method Hybrid method 11. Haitao Zhang, Zewei Chen, Zhao Liu, Yunhong Zhu, & Chenxue Wu 2016 Rough Prediction and Accurate Prediction KAnonymity Dataset created from Google Maps, Foursquare, BaiduMaps, etc Data Mining Public 12. Sungjun Lee, Junseok Lim, Jonghun Park & Kwanho Kim 2016 Spatio-temporal Periodic Pattern 714,448WiFi signal logs around 50 Days Data Mining Campus of Seoul National University 13. Ahmed Azeez Khudhair, Saba Qasim Jabbar, Mohammed Qasim Sulttan & Desheng Wang 2016 triangulation, fingerprinting, proximity, vision analysis and trilateration Some Indoor Localization Systems Wireless Systems Indoor 14. V.Nivedha, E. Karunakaran & J.Kumaran@Kumar 2017 Approximate Multiple alignment pattern mining --- Data Mining Public WLANS 15. Sushil Kumar Verma, R.S. Thakur & Shailesh Jaloree 2017 Fuzzy Association Rule Mining 204 Students Records Data Mining Samrat Ashok Technological Institute, Vidisha, Madhya Pradesh, India
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3112 - 3117 3116 2.16. Rough Prediction and Accurate Prediction The basic theory of Location Based System queries and the primitives of Location Based System privacy were introduced. Samples of anonymity datasets adopted by a typical method of spatial-temporal k-anonymity were explained. For predicting the locations, the following steps were proposed by authors [11]. a. Extracting sequential rules from anonymity datasets b. Building transition probability matrices from the mined sequential rules; c. Normalizing the transition probabilities d. Calculating n-step transition probability matrices e. Crafting a rough prediction method and an accurate prediction method based on the n-step transition probability The Predictions were evaluated by the two types of experiments, In the Exp.1, accurate prediction finds from the detailed paths obtained by using the Algorithm which gets inputs as simple paths of mobiles. Whereas in the Exp.2, verify the correctness of the proposed Location prediction methods. 2.17. Spatio-temporal Periodic Pattern The above pattern [12] was used for capture the visits of the places of mobile users in different timings and different days, based on the past visits, the future visit will be predicted. The authors were experimented with real data set of the students of Seoul National University. The GPS and WIFI were acted as recorders of the user visits. And also smart phones involved. The experiments implemented by first order markov chain methods. 2.18. Triangulation, fingerprinting, proximity, vision analysis and tri-lateration Techniques: The authors [13] measured the above five local prediction approaches, and estimated the performance in-terms of Accuracy, Robustness, Cost, Scalability and complexity. Their characteristics of indoor localization systems were listed. In the above study, the authors considered about the continuously tracking people between indoor and outdoor environments. 2.19. Approximate Multiple Alignment Pattern Mining: The authors [14] combined Clustering and Sequential Pattern Mining techniques found the Approximate Multiple Alignment Pattern Mining technique that used quality rules and discovered from various similar user behaviors. The authors found Location Prediction based on individual Movement History and Multiple user movements histories. 2.20. Fuzzy Association Rule Mining: By using the above method, the authors [15] were evaluated the performance of two sets of students and predicted the performance in end of the semester of their course based on the previous academic performance likely attendance, internal marks etc., and found the revision of curriculum and all. 3. CONCLUSION In the above study, many authors used data mining techniques to find the locations of the movements of the mobile users. But, the Data Mining techniques having two drawbacks, the first is, they may fail to predict new users or users with movement on novel methods. Second, reduction in accuracy for regular movement and random movements having similar quality behaviors of mobile users. To overcome this situation, Researchers can choose Neural Networks for getting accuracy and exact prediction of Locations. REFERENCES [1] Theodoros Anagnostopoulos, Christos Anagnostopoulos & Stathes Hadjiefthymiades, An adaptive location prediction model based on fuzzy control, Computer Communications,Elsevier (2010),Vol 34, pp.814-834. [2] Theodoros Anagnostopoulos, Christos Anagnostopoulos & Stathes Hadjiefthymiades, Efficient Location Prediction in Mobile Cellular Networks, International Journal of Wireless Information Networks, Springer (2012), Vol-19, pp.97-111. [3] Nusrat Ahmed Surobhi & Abbas Jamalipour, Movement Prediction of Mobile Users inEmergencies Using M2M Networks, IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications, (2012)pp.2535-2540. [4] Sandhya Avasthi, Avinash Dwivedi, Prediction of Mobile user Behavior using Clustering, International Journal of Scientific and Research Publications,(2013), Vol. 3, Issue 2, pp.1 – 5.
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  A Study of Mobile User Movements Prediction Methods (J. Venkata Subramanian) 3117 [5] Rachida Aoudjit, Malika Belkadi, Mehammed Daoui, Lynda Chamek,Sofiane Hemrioui & Mustapha Lalam, Mobility Prediction Based on Data mining, International Journal of Database Theory and Application, (2013), Vol. 6, No. 2, pp.71-78. [6] Dac-Nhuong Le, (2013), GA and ACO Algorithms Applied to Optimizing Location of Controllers in Wireless Networks, International Journal of Electrical and Computer Engineering, Vol. 3, No. 2, pp. 221~229 [7] Thuy Van T. Duong & Dinh Que Tran, A Fusion Of Data Mining Techniques For Predicting Movement Of Mobile Users, Journal of Communications and Networks,(2015), VOL. X, NO. Y, pp.1-14. [8] Jawdat Jamil Alshaer, Mobile Object-Tracking Approach using a Combination of Fuzzy Logic and Neural Networks, Global Journal of Computer Science and Technology ( E ), (2015), Vol. XV Issue VIII Ver. I Year, pp.19-25. [9] Marin Vukovic & Dragan Jevtic, Agent-based Movement Analysis and Location Prediction in Cellular Networks, 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems(Elsevier), (2015),pp. 517 – 526 . [10] Cristian L. Leca, Leontin Tută, Ioan Nicolaescu & Cristian I. Rîncu, Recent advances in location prediction methods for cellular communication networks, IEEE 23rd Telecommunications forum(2015), pp.1-5. [11] Haitao Zhang, Zewei Chen, Zhao Liu, Yunhong Zhu, & Chenxue Wu, Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal KAnonymity Dataset, PLOS ONE Journal, (2016), pp. 1 – 22. [12] Sungjun Lee, Junseok Lim, Jonghun Park & Kwanho Kim, Next Place Prediction Based on Spatiotemporal Pattern Mining of Mobile Device Logs, MDPI (Sensors) Journal,(2016), pp.1-19. [13] Ahmed Azeez Khudhair, Saba Qasim Jabbar, Mohammed Qasim Sulttan, Desheng Wang, Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study, Indonesian Journal of Electrical Engineering and Computer Science, (2016), Vol. 3, No. 2, pp. 392 ~ 409 [14] V.Nivedha, E. Karunakaran & J.Kumaran@Kumar, A Novel Approach for Predicting Movement of Mobile Users Based on Data Mining Techniques, International Research Journal of Engineering and Technology, (2017), Vol-4, Issue – 4, pp 3603 – 3608. [15] Sushil Kumar Verma, R.S. Thakur, Shailesh Jaloree, Fuzzy Association Rule Mining based Model to Predict Students’ Performance, International Journal of Electrical and Computer Engineering, (2017), Vol. 7, No. 4, pp. 2223~2231.