SlideShare a Scribd company logo
1 of 5
Download to read offline
Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 
www.ijera.com 134 | P a g e 
Use of Hidden Markov Mobility Model for Location Based Services Bhakti D. Shelar*, Mr. D. K. Chitre** *(Department of Computer Engineering, Terna Engineering College, Neral, Mumbai University, Navi Mumbai) ** (Department of Computer Engineering, Terna Engineering College, Neral, Mumbai University, Navi Mumbai ) ABSTRACT These days people prefer to use portable and wireless devices such as laptops, mobile phones, They are connected through satellites. As user moves from one point to other, task of updating stored information becomes difficult. Provision of Location based services to users, faces some challenges like limited bandwidth and limited client power. To optimize data accessibility and to minimize access cost, we can store frequently accessed data item in cache of client. So small size of cache is introduced in mobile devices. Data fetched from server is stored on cache. So requested data from user is provided from cache and not from remote server. Question arises that which data should be kept in the cache? Performance of cache majorly depends on the cache replacement policies which select data suitable for eviction from cache. This paper presents use of Hidden Markov Models(HMMs) for prediction of user‟s future location. Then data item irrelevant to this predicted location is fetched out from the cache. The proposed approach clusters location histories according to their location characteristics and also it considers each user‟s previous actions. This results in producing high packet delivery ratio and minimum delay. 
Keywords – Cache replacement policy, Hidden Markov Model, Hidden state, Location Based Services, random Variables 
I. INTRODUCTION 
A mobile ad hoc network is a type of wireless network. Wireless devices come together and form a temporary infrastructure-less network for communication purpose. Each device is free to move in any direction and it must pass on the data traffic unrelated to its own use. The basic aspect of constructing a MANET is each device must be efficient enough to maintain the information required to properly route traffic. 
Fig. 1 Mobile Ad hoc Network(MANET) As shown in Fig. 1[1], such networks are capable to be operated by themselves by using else they are inter connected to the Internet through Access Router. Security of data traffic is tried to achieve by using cryptography. Wireless devices may contain one or multiple and different transceivers between nodes. 
Location based service (LBS) is a programmed application for mobile client which requires information related to its current location. This service is query-based and provides useful information to the user such as “nearest Gas Station ” or “nearest Restaurant”. Also LBS can be push- based which periodically provides location relevant and useful information to the user. As shown in Fig. 2[2], mobile devices form cellular network connected with satellites. One location server is maintained to store data local to that cellular network, which is provided to the client. The frequently accessed data is then placed in client‟s cache. An LBS requires five basic components: end user's mobile device, a content provider to supply the end user with geo-specific information, the service provider's software application, a mobile network to transmit data and requests for service, , a positioning component like Global Positioning System(GPS). 
Fig. 2 Location Based Service System 
RESEARCH ARTICLE OPEN ACCESS
Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 
www.ijera.com 135 | P a g e 
Caching in MANET has some constraints like limited cache space, limited power supply and high mobility. The availability of the data in local cache minimizes access cost and transmission delay. An efficient cache replacement mechanism is needed to differentiate the items to be kept in cache and that is to be evicted when the cache is full. Rather than selecting random data item from cache, system performance will be better if we select data item that is not frequently asked or not relevant to the user‟s current location. So a good replacement policy is essential to achieve high hit rates. The rest of the paper is organized as follows. Section II briefly describes survey of the different cache replacement policies. Section III details the Hidden Markov Mobility model. Section IV explains Least Recently Used and section V explains Furthest Away Replacement policies implemented in NS2. Section VI and section VII deal with Experimental scenario and Result Analysis. Section VIII concludes the paper. 
II. LITERATURE SURVEY 
Existing cache replacement policies determine the cost functions of data item. These functions may be access frequency, update rate, size of item etc. Least Recently Used (LRU), Least Frequently Used (LFU) and LRU-k [13] are the temporal based replacement policies. These algorithms replace data items which are accessed recently or frequently. These policies are based on the assumption that Mobile user‟s access patterns exhibit temporal locality. It means that data item objects that were queried frequently in the past will be queried in future). However, in mobile environments where clients take service from location based service system. Clients access pattern don‟t exhibit only temporal locality, but also exhibit dependence on location of data, location of the client and direction of the client‟s movement [4][5]. Due to this, these described policies are unsuitable for supporting location dependent services because they do not consider the movement of mobile clients and location of data items. Hence, depending only on temporal locality when making cache replacement decisions will result in poor cache hit ratio in LBS. 
To Solve these difficulties , some location-aware cache replacement strategies[5][7][9][10] have been proposed for location based services. Manhattan Distance-based cache replacement policy [10] supports location dependent queries in urban environments. Cache replacement decisions are made on the basis of distance between a client‟s current location and the location of each cached data object. Objects with the highest Manhattan distance from the client‟s current location are evicted at cache replacement. Furthest Away Replacement (FAR) [9] policy uses the current location and movement direction of mobile clients to make cache replacement decisions. Cached objects are grouped into two sets, viz., in-direction set and the outdirection set. Data objects in the out-direction set are always evicted first before those in the in- direction set. In Probability Area Inverse Distance (PAID) [5] policy, the cost function of data item i takes into account the access probabilities (Pi) of data objects, area of its valid scopes A(vsi) and the distance D(vsi) between the client‟s current position and the valid scope of the object concerned (known as data distance None of these cache replacement policies are suitable if client changes its direction of movement quite often. Existing cache replacement policies only consider the data distance but not the distance based on the predicted region or area where the mobile user may be in future. Very few of these policies [5][7] account for the location and movement of mobile clients. In this paper, we study the problem of analysing human location histories to predict the next places to be visited This we have done by using an approach based on Hidden Markov Models. Also we have evaluated its limitations on real-world data. This paper proposes an approach for predicting the future locations of mobile users and then keep location- related data in the cache and evict unrelated data from the cache. These decisions are made on the basis of user‟s previous visits to other locations, and leveraging on Hidden Markov Models for capturing the patterns embedded in previously collected location histories. This policy considers most probable future location of the user and then takes the replacement decisions. 
III. PROPOSED METHOD 
Fig. 3 Hidden Markov Model 
The diagram in Figure 3 shows the general architecture of an instantiated HMM. Each shape in the diagram represents a random variable that can adopt any of a number of values. The random variable x(t) is the hidden state at time t. x(t) € {x1, x2, x3} random variable y(t) is the location visited at time t (with y(t) € {y1, y2, y3, y4}. The arrows in the diagram denote conditional dependencies. conditional probability distribution of the hidden
Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 
www.ijera.com 136 | P a g e 
variable x(t) at time t, depends only on the value of the hidden variable x(t -1), and thus the values at time t-2 and before have no influence. This is called the Markov property. The value of the observed location y(t) only depends on the value of the hidden variable x(t), at time t. The probability of next location is calculated by using given formula : 
Where, X is hidden variable, i.e. previous location of user and X= <x(1),x(2),x(3),…..>. Y is current location visited at time tof user and Y= <y(1),y(2),y(3),…..>. Overcomes the limitation of Random models to capture temporal dependency. Mobility of a node constrained by the physical laws of acceleration, velocity and rate of change of direction. the velocities of single node at different time slots are „correlated'. Very much useful to capture real world scenarios. 
IV. LEAST RECENTLY USED(LRU) CACHE REPLACEMENT POLICY 
The least-recently-used cache replacement policy is one that evicts items that are accessed least frequently once its threshold has been exceeded. In simple terms, the LRU cache will remove the element in the cache that has not been accessed in the longest time. LRU replaces data item based on the recency of its access. It considers temporal locality of client‟s access pattern. Also it neglects location and movement direction of mobile client. LRU Algorithm:- 
1. Declare a reference count. 
2. When data is accessed reference count incremented by 1. 
3. Consider timestamp of cached data. 
4. Determine a threshold value. 
5. If (timestamp(data) < threshold) Eject from the cache else Retain in the cache. 
V. FURTHEST AWAY REPLACEMENT (FAR) CACHE REPLACEMENT POLICY 
FAR uses current location and movement direction of the client to make replacement decisions. Also it neglects the temporal locality of cached data item. FAR Algorithm:- 
1. Consider the (x,y) coordinates of client‟s 
location. 
2. Calculate distance between data item and 
client 
3. Determine a threshold value. 
4. If (distance di > threshold) Put data item in the out_direction set. Else Put data item in the in_direction set. 
5. Always evict the data items in out_direction set first. 
Later evict the data items in in_direction set if required. 
VI. EXPERIMENTAL SCENARIO 
We used Network Simulator version 2 (NS2) simulator for implementation of topologies and three (LRU, FAR AND HMM based ) cache replacement policies. NS2 simulator provides more flexible coding support to design topologies. Also, it generates trace file to analyse the performance of algorithms implemented. The simulation runs for 10 milliseconds and uses 50 mobile nodes. Geographical region boundary is defined within 500 x 500 area. When any node reaches the boundary, it is repelled back towards the centre. Flatgrid network topology is used. For transmission purpose, omni-directional antenna is used. Omni directional antenna is best suitable for moving nodes. For comparison of three cache replacement policies we have considered following three performance metrics: a) Packet Delivery Ratio:- The ratio of packets that are successfully delivered to a estination compared to the number of packets that have been sent out by the sender. b) Link Throughput :- is the rate of successful message delivery over a communication channel. c) Transmission Delay:- end to end delay is the duration since a packet enters a queue of a source node until it arrives at the packet node. 
VII. RESULTS AND ANALYSIS 
Following graphical analysis is done based on the packet delivery ratio, throughput and delay calculated. The values for these parameters are calculated from the NS2 trace files. 
Fig. 4 Packet Delivery Ratio of HMM, LRU, FAR As shown in Fig. 4, x-axis indicates time parameter in seconds and y-axis indicates packet delivery ratio. Blue line indicates packet delivery ratio generated by HMM based cache replacement, red line indicates indicates packet delivery ratio generated by LRU based cache replacement and green line indicates packet delivery ratio generated by FAR based cache replacement. So graph shows that proposed approach of HMM gives highest cache hit ratio for packet transmission.
Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 
www.ijera.com 137 | P a g e 
Fig. 5 Throughput of HMM, LRU, FAR In Fig. 5 graph describes the link throughput given by HMM based, LRU based and FAR based cache replacement. Time in seconds is plotted against x-axis and throughput in number of packets is plotted against y-axis. Graphical analysis indicates that HMM based approach is caliper to generate highest throughput than LRU and FAR approach, which is really expected from real world applications. 
Fig. 6 Transmission Delay of HMM, LRU, FAR As shown in Fig. 6 HMM based cache replacement overcomes the unwanted delay just because of the more accurate prediction of the future location. It produces the lowest delay while transmission. Table 1 summarizes the performance evaluation of all three cache replacement policies. Delay parameter is inversely proportional to the number of packets transmitted. In FAR packet delivery ratio increases as compared to that of LRU. FAR policy gives better cache hit ratio than LRU. TABLE 1. Comparison of LRU, FAR and HMM Based cache replacement policies 
FAR packet delivery ratio increases as compared to that of LRU. Also when we follow FAR cache replacement policy, then throughput also increases as compared to the LRU. FAR policy gives better cache hit ratio than LRU. HMM based policy gives best results in all the three aspects. Its prediction accuracy gives benefit of better cache performance. 
VIII. CONCLUSION 
HMM based CRP considers current location of moving client. Also it considers moving direction of user and traces location histories of client. Then it predicts probable future location. HMM based CRP keeps only that data in cache, which is relevant to that predicted location. So, HMM based CRP proves most accurate replacement policy compared to the LRU and FAR. LRU considers only no. of times data item is accessed. This information is partial and abstractive in order to make replacement decisions. FAR considers current location and movement direction of client to take replacement decisions. FAR neglects temporal properties of data item leading to less accuracy. 
IX. ACKNOWLEDGEMENTS 
The authors would like to express their gratitude to Terna Engineering College, Nerul, Navi Mumbai. for technical support offered required for experimental evaluation. Also we express special thanks to the “Network Simulator version 2” Training and Workshop session held at Sinhgad Institute Of Technology Lonavala, Pune. 
REFERENCES 
[1] http://www.personal.psu.edu/sxr360/blogs/ mobileadhoc networkpic 
[2] http://www.watblog.com/2008/04/16/mobile -positioning-and-location-based-services-an- insight-into-the-future-of-mobile/ [3] Ajey Kumar, Manoj Misra, Anil K. Sarje, “A Predicted Region based Cache Replacement Policy for Location Dependent Data in Mobile Environment”,I. J. Communications, Network and System Sciences. 2008; 1: 1-103. [4] D. Barbara, “Mobile Computing and Databases: A Survey,” IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 1, pp. 108-117, January/February 1999. [5] D. Barbara and T. Imielinski, “Sleepers and Workaholics: Caching Strategies in Mobile Environments,” In the Proceedings of the ACM SIGMOD Conference on Management of Data, Minneapolis, USA, pp. 1-12, 1994. 
[6] E. O‟Neil and P. O‟Neil, “The LRU-k page replacement algorithm for database disk LRU FAR HMM Preferable Pdr High Low Highest Hmm Through Put High Low Highest Hmm Delay Medium High Low Hmm
Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 
www.ijera.com 138 | P a g e 
buffering”, In the Proceedings of the ACM SIGMOD, Vol. 22, No. 2, pp. 296-306, 1993. [7] Q. Ren and M. H. Dhunham, “Using Semantic Caching to Manage Location Dependent Data in Mobile Computing,” In the Proceedings of 6th ACM/IEEE Mobile Computing and Networking (MobiCom), Boston, USA, pp. 210-221, 2000. [8] B. Zheng, J. Xu and D. L. Lee, “Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments,” IEEE Transactions on omputers, Vol. 51, No. 10, pp. 1141-1153, October 2002. [9] K. Lai, Z. Tari and P. Bertok, “Location– Aware Cache Replacement for Mobile Environments,” IEEE Global Telecommunication Conference (GLOBECOM 04), Vol. 6, pp. 3441-3447, 29th November- 3rd December 2004. [10] S. Dar, M. J. Franklin, B. T. Jonsson, D. Srivastava and M. Tan, “Semantic Data Caching and Replacement,” In the Proceedings of the 22nd International Conference on Very Large Databases (VLDB), pp. 330-341, 1996. [11] Balamash and M. Krunz, “An Overview of Web Caching Replacement Algorithms,” IEEE Communications Surveys & Tutorials, Vol. 6, [12] D. L. Lee, W.-C. Lee, J. Xu and B. Zheng, “Data Management in Location-Dependent Information Services,” IEEE Pervasive Computing, Vol. 1, No. 3, pp. 65-72, July 2002. [13] J. Jing, A. Helal and A. Elmagarmid, “Client-Server Computing in Mobile Environments,” In the Proceedings of the ACM Computing Surveys, Vol. 31, No. 2, pp. 117-157, June 1999. [14] T. Camp, J. Boleng and V. Davies, “A Survey of Mobility Model for Ad Hoc Network Research,” Wireless Communication & Mobile Computing (WCMC): Special Issue on Mobile AdHoc Networking: Research, Trends and Applications, Vol. 2, No. 5, pp. 483-502, 2002. [15] A. Balamash and M. Krunz, “An Overview of Web Caching Replacement Algorithms,” IEEE Communications Surveys & Tutorials, Vol. 6, No. 2, pp. 44-56, 2004. [16] I. A. Getting, “The Global Positioning System,” IEEE Spectrum, Vol. 30, No. 12, pp. 36-47, December 1993.

More Related Content

What's hot

Data collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collectorData collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collectorijwmn
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...CSCJournals
 
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...ijcsa
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Paper id 2320143
Paper id 2320143Paper id 2320143
Paper id 2320143IJRAT
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...M H
 
Dynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementDynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementeSAT Publishing House
 
Dynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementDynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementeSAT Journals
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manetseSAT Journals
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...M H
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
 

What's hot (20)

Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Data collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collectorData collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collector
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Paper id 2320143
Paper id 2320143Paper id 2320143
Paper id 2320143
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
 
Dynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementDynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy management
 
Dynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementDynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy management
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Ax34298305
Ax34298305Ax34298305
Ax34298305
 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and Approaches
 

Viewers also liked

Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...
Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...
Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...IJERA Editor
 
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
 
Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...
Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...
Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...IJERA Editor
 
Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...
Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...
Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...IJERA Editor
 
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...IJERA Editor
 
BIM-Based Cost Estimation/ Monitoring For Building Construction
BIM-Based Cost Estimation/ Monitoring For Building ConstructionBIM-Based Cost Estimation/ Monitoring For Building Construction
BIM-Based Cost Estimation/ Monitoring For Building ConstructionIJERA Editor
 
Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...
Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...
Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...IJERA Editor
 
A Decision tree and Conditional Median Filter Based Denoising for impulse noi...
A Decision tree and Conditional Median Filter Based Denoising for impulse noi...A Decision tree and Conditional Median Filter Based Denoising for impulse noi...
A Decision tree and Conditional Median Filter Based Denoising for impulse noi...IJERA Editor
 
Transient Stability Enhancement of a Multi-Machine System using Particle Swar...
Transient Stability Enhancement of a Multi-Machine System using Particle Swar...Transient Stability Enhancement of a Multi-Machine System using Particle Swar...
Transient Stability Enhancement of a Multi-Machine System using Particle Swar...IJERA Editor
 
A cloud solution for medical image processing
A cloud solution for medical image processingA cloud solution for medical image processing
A cloud solution for medical image processingIJERA Editor
 
Effect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy Composites
Effect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy CompositesEffect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy Composites
Effect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy CompositesIJERA Editor
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
 
Design of Lattice Wind Turbine Towers With Structural Optimization
Design of Lattice Wind Turbine Towers With Structural OptimizationDesign of Lattice Wind Turbine Towers With Structural Optimization
Design of Lattice Wind Turbine Towers With Structural OptimizationIJERA Editor
 
Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...
Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...
Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...IJERA Editor
 
Neonatal Monitoring System
Neonatal Monitoring SystemNeonatal Monitoring System
Neonatal Monitoring SystemIJERA Editor
 
Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...
Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...
Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...IJERA Editor
 
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...IJERA Editor
 
Experimental and Fe Analysis of Eccentric Loaded Welded Joint Structure
Experimental and Fe Analysis of Eccentric Loaded Welded Joint StructureExperimental and Fe Analysis of Eccentric Loaded Welded Joint Structure
Experimental and Fe Analysis of Eccentric Loaded Welded Joint StructureIJERA Editor
 

Viewers also liked (19)

Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...
Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...
Design and Simulation of Different Controllers for Stabilizing Inverted Pendu...
 
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...
 
Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...
Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...
Integrated Petrophysical Parameters and Petrographic Analysis Characterizing ...
 
Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...
Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...
Selection of Best Supplier in Furniture Manufacturing Company by Using Analyt...
 
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
 
BIM-Based Cost Estimation/ Monitoring For Building Construction
BIM-Based Cost Estimation/ Monitoring For Building ConstructionBIM-Based Cost Estimation/ Monitoring For Building Construction
BIM-Based Cost Estimation/ Monitoring For Building Construction
 
T4805124135
T4805124135T4805124135
T4805124135
 
Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...
Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...
Power System’stransmission Line Relaying Improvement Using Discrete Wavelet T...
 
A Decision tree and Conditional Median Filter Based Denoising for impulse noi...
A Decision tree and Conditional Median Filter Based Denoising for impulse noi...A Decision tree and Conditional Median Filter Based Denoising for impulse noi...
A Decision tree and Conditional Median Filter Based Denoising for impulse noi...
 
Transient Stability Enhancement of a Multi-Machine System using Particle Swar...
Transient Stability Enhancement of a Multi-Machine System using Particle Swar...Transient Stability Enhancement of a Multi-Machine System using Particle Swar...
Transient Stability Enhancement of a Multi-Machine System using Particle Swar...
 
A cloud solution for medical image processing
A cloud solution for medical image processingA cloud solution for medical image processing
A cloud solution for medical image processing
 
Effect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy Composites
Effect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy CompositesEffect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy Composites
Effect of Fillers on E-Glass/Jute Fiber Reinforced Epoxy Composites
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
Design of Lattice Wind Turbine Towers With Structural Optimization
Design of Lattice Wind Turbine Towers With Structural OptimizationDesign of Lattice Wind Turbine Towers With Structural Optimization
Design of Lattice Wind Turbine Towers With Structural Optimization
 
Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...
Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...
Effect of Milling Time on Al-Fe-Cr-20 Wt. % Al2O3composite Prepared Through B...
 
Neonatal Monitoring System
Neonatal Monitoring SystemNeonatal Monitoring System
Neonatal Monitoring System
 
Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...
Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...
Utilisation of RAP (Reclaimed Asphalt Pavement) Material Obtained By Milling ...
 
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...
Multi-Objective Optimization ( Surface Roughness & Material Removal Rate) of ...
 
Experimental and Fe Analysis of Eccentric Loaded Welded Joint Structure
Experimental and Fe Analysis of Eccentric Loaded Welded Joint StructureExperimental and Fe Analysis of Eccentric Loaded Welded Joint Structure
Experimental and Fe Analysis of Eccentric Loaded Welded Joint Structure
 

Similar to Use of Hidden Markov Mobility Model for Location Based Services

A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
 
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.ijiert bestjournal
 
Implementation of lru algorithm for location update in wireless m2 m communic...
Implementation of lru algorithm for location update in wireless m2 m communic...Implementation of lru algorithm for location update in wireless m2 m communic...
Implementation of lru algorithm for location update in wireless m2 m communic...eSAT Publishing House
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd Iaetsd
 
Survey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkSurvey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkeSAT Journals
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoIAEME Publication
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesIDES Editor
 
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...IJMTST Journal
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniquesijcsa
 
a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments marwaeng
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
 
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...CSCJournals
 
A Study of Mobile User Movements Prediction Methods
A Study of Mobile User Movements Prediction Methods A Study of Mobile User Movements Prediction Methods
A Study of Mobile User Movements Prediction Methods IJECEIAES
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringeSAT Journals
 

Similar to Use of Hidden Markov Mobility Model for Location Based Services (20)

A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
SURVEY PAPER ON PRIVACY IN LOCATION BASED SEARCH QUERIES.
 
Implementation of lru algorithm for location update in wireless m2 m communic...
Implementation of lru algorithm for location update in wireless m2 m communic...Implementation of lru algorithm for location update in wireless m2 m communic...
Implementation of lru algorithm for location update in wireless m2 m communic...
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 
azd document
azd documentazd document
azd document
 
Survey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial networkSurvey on confidentiality of the user and query processing on spatial network
Survey on confidentiality of the user and query processing on spatial network
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwo
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile Queries
 
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
 
H017665256
H017665256H017665256
H017665256
 
Privacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based QueriesPrivacy - Preserving Reputation with Content Protecting Location Based Queries
Privacy - Preserving Reputation with Content Protecting Location Based Queries
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
 
C04953540
C04953540C04953540
C04953540
 
a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...
 
A Study of Mobile User Movements Prediction Methods
A Study of Mobile User Movements Prediction Methods A Study of Mobile User Movements Prediction Methods
A Study of Mobile User Movements Prediction Methods
 
H0944649
H0944649H0944649
H0944649
 
A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clustering
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Use of Hidden Markov Mobility Model for Location Based Services

  • 1. Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 www.ijera.com 134 | P a g e Use of Hidden Markov Mobility Model for Location Based Services Bhakti D. Shelar*, Mr. D. K. Chitre** *(Department of Computer Engineering, Terna Engineering College, Neral, Mumbai University, Navi Mumbai) ** (Department of Computer Engineering, Terna Engineering College, Neral, Mumbai University, Navi Mumbai ) ABSTRACT These days people prefer to use portable and wireless devices such as laptops, mobile phones, They are connected through satellites. As user moves from one point to other, task of updating stored information becomes difficult. Provision of Location based services to users, faces some challenges like limited bandwidth and limited client power. To optimize data accessibility and to minimize access cost, we can store frequently accessed data item in cache of client. So small size of cache is introduced in mobile devices. Data fetched from server is stored on cache. So requested data from user is provided from cache and not from remote server. Question arises that which data should be kept in the cache? Performance of cache majorly depends on the cache replacement policies which select data suitable for eviction from cache. This paper presents use of Hidden Markov Models(HMMs) for prediction of user‟s future location. Then data item irrelevant to this predicted location is fetched out from the cache. The proposed approach clusters location histories according to their location characteristics and also it considers each user‟s previous actions. This results in producing high packet delivery ratio and minimum delay. Keywords – Cache replacement policy, Hidden Markov Model, Hidden state, Location Based Services, random Variables I. INTRODUCTION A mobile ad hoc network is a type of wireless network. Wireless devices come together and form a temporary infrastructure-less network for communication purpose. Each device is free to move in any direction and it must pass on the data traffic unrelated to its own use. The basic aspect of constructing a MANET is each device must be efficient enough to maintain the information required to properly route traffic. Fig. 1 Mobile Ad hoc Network(MANET) As shown in Fig. 1[1], such networks are capable to be operated by themselves by using else they are inter connected to the Internet through Access Router. Security of data traffic is tried to achieve by using cryptography. Wireless devices may contain one or multiple and different transceivers between nodes. Location based service (LBS) is a programmed application for mobile client which requires information related to its current location. This service is query-based and provides useful information to the user such as “nearest Gas Station ” or “nearest Restaurant”. Also LBS can be push- based which periodically provides location relevant and useful information to the user. As shown in Fig. 2[2], mobile devices form cellular network connected with satellites. One location server is maintained to store data local to that cellular network, which is provided to the client. The frequently accessed data is then placed in client‟s cache. An LBS requires five basic components: end user's mobile device, a content provider to supply the end user with geo-specific information, the service provider's software application, a mobile network to transmit data and requests for service, , a positioning component like Global Positioning System(GPS). Fig. 2 Location Based Service System RESEARCH ARTICLE OPEN ACCESS
  • 2. Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 www.ijera.com 135 | P a g e Caching in MANET has some constraints like limited cache space, limited power supply and high mobility. The availability of the data in local cache minimizes access cost and transmission delay. An efficient cache replacement mechanism is needed to differentiate the items to be kept in cache and that is to be evicted when the cache is full. Rather than selecting random data item from cache, system performance will be better if we select data item that is not frequently asked or not relevant to the user‟s current location. So a good replacement policy is essential to achieve high hit rates. The rest of the paper is organized as follows. Section II briefly describes survey of the different cache replacement policies. Section III details the Hidden Markov Mobility model. Section IV explains Least Recently Used and section V explains Furthest Away Replacement policies implemented in NS2. Section VI and section VII deal with Experimental scenario and Result Analysis. Section VIII concludes the paper. II. LITERATURE SURVEY Existing cache replacement policies determine the cost functions of data item. These functions may be access frequency, update rate, size of item etc. Least Recently Used (LRU), Least Frequently Used (LFU) and LRU-k [13] are the temporal based replacement policies. These algorithms replace data items which are accessed recently or frequently. These policies are based on the assumption that Mobile user‟s access patterns exhibit temporal locality. It means that data item objects that were queried frequently in the past will be queried in future). However, in mobile environments where clients take service from location based service system. Clients access pattern don‟t exhibit only temporal locality, but also exhibit dependence on location of data, location of the client and direction of the client‟s movement [4][5]. Due to this, these described policies are unsuitable for supporting location dependent services because they do not consider the movement of mobile clients and location of data items. Hence, depending only on temporal locality when making cache replacement decisions will result in poor cache hit ratio in LBS. To Solve these difficulties , some location-aware cache replacement strategies[5][7][9][10] have been proposed for location based services. Manhattan Distance-based cache replacement policy [10] supports location dependent queries in urban environments. Cache replacement decisions are made on the basis of distance between a client‟s current location and the location of each cached data object. Objects with the highest Manhattan distance from the client‟s current location are evicted at cache replacement. Furthest Away Replacement (FAR) [9] policy uses the current location and movement direction of mobile clients to make cache replacement decisions. Cached objects are grouped into two sets, viz., in-direction set and the outdirection set. Data objects in the out-direction set are always evicted first before those in the in- direction set. In Probability Area Inverse Distance (PAID) [5] policy, the cost function of data item i takes into account the access probabilities (Pi) of data objects, area of its valid scopes A(vsi) and the distance D(vsi) between the client‟s current position and the valid scope of the object concerned (known as data distance None of these cache replacement policies are suitable if client changes its direction of movement quite often. Existing cache replacement policies only consider the data distance but not the distance based on the predicted region or area where the mobile user may be in future. Very few of these policies [5][7] account for the location and movement of mobile clients. In this paper, we study the problem of analysing human location histories to predict the next places to be visited This we have done by using an approach based on Hidden Markov Models. Also we have evaluated its limitations on real-world data. This paper proposes an approach for predicting the future locations of mobile users and then keep location- related data in the cache and evict unrelated data from the cache. These decisions are made on the basis of user‟s previous visits to other locations, and leveraging on Hidden Markov Models for capturing the patterns embedded in previously collected location histories. This policy considers most probable future location of the user and then takes the replacement decisions. III. PROPOSED METHOD Fig. 3 Hidden Markov Model The diagram in Figure 3 shows the general architecture of an instantiated HMM. Each shape in the diagram represents a random variable that can adopt any of a number of values. The random variable x(t) is the hidden state at time t. x(t) € {x1, x2, x3} random variable y(t) is the location visited at time t (with y(t) € {y1, y2, y3, y4}. The arrows in the diagram denote conditional dependencies. conditional probability distribution of the hidden
  • 3. Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 www.ijera.com 136 | P a g e variable x(t) at time t, depends only on the value of the hidden variable x(t -1), and thus the values at time t-2 and before have no influence. This is called the Markov property. The value of the observed location y(t) only depends on the value of the hidden variable x(t), at time t. The probability of next location is calculated by using given formula : Where, X is hidden variable, i.e. previous location of user and X= <x(1),x(2),x(3),…..>. Y is current location visited at time tof user and Y= <y(1),y(2),y(3),…..>. Overcomes the limitation of Random models to capture temporal dependency. Mobility of a node constrained by the physical laws of acceleration, velocity and rate of change of direction. the velocities of single node at different time slots are „correlated'. Very much useful to capture real world scenarios. IV. LEAST RECENTLY USED(LRU) CACHE REPLACEMENT POLICY The least-recently-used cache replacement policy is one that evicts items that are accessed least frequently once its threshold has been exceeded. In simple terms, the LRU cache will remove the element in the cache that has not been accessed in the longest time. LRU replaces data item based on the recency of its access. It considers temporal locality of client‟s access pattern. Also it neglects location and movement direction of mobile client. LRU Algorithm:- 1. Declare a reference count. 2. When data is accessed reference count incremented by 1. 3. Consider timestamp of cached data. 4. Determine a threshold value. 5. If (timestamp(data) < threshold) Eject from the cache else Retain in the cache. V. FURTHEST AWAY REPLACEMENT (FAR) CACHE REPLACEMENT POLICY FAR uses current location and movement direction of the client to make replacement decisions. Also it neglects the temporal locality of cached data item. FAR Algorithm:- 1. Consider the (x,y) coordinates of client‟s location. 2. Calculate distance between data item and client 3. Determine a threshold value. 4. If (distance di > threshold) Put data item in the out_direction set. Else Put data item in the in_direction set. 5. Always evict the data items in out_direction set first. Later evict the data items in in_direction set if required. VI. EXPERIMENTAL SCENARIO We used Network Simulator version 2 (NS2) simulator for implementation of topologies and three (LRU, FAR AND HMM based ) cache replacement policies. NS2 simulator provides more flexible coding support to design topologies. Also, it generates trace file to analyse the performance of algorithms implemented. The simulation runs for 10 milliseconds and uses 50 mobile nodes. Geographical region boundary is defined within 500 x 500 area. When any node reaches the boundary, it is repelled back towards the centre. Flatgrid network topology is used. For transmission purpose, omni-directional antenna is used. Omni directional antenna is best suitable for moving nodes. For comparison of three cache replacement policies we have considered following three performance metrics: a) Packet Delivery Ratio:- The ratio of packets that are successfully delivered to a estination compared to the number of packets that have been sent out by the sender. b) Link Throughput :- is the rate of successful message delivery over a communication channel. c) Transmission Delay:- end to end delay is the duration since a packet enters a queue of a source node until it arrives at the packet node. VII. RESULTS AND ANALYSIS Following graphical analysis is done based on the packet delivery ratio, throughput and delay calculated. The values for these parameters are calculated from the NS2 trace files. Fig. 4 Packet Delivery Ratio of HMM, LRU, FAR As shown in Fig. 4, x-axis indicates time parameter in seconds and y-axis indicates packet delivery ratio. Blue line indicates packet delivery ratio generated by HMM based cache replacement, red line indicates indicates packet delivery ratio generated by LRU based cache replacement and green line indicates packet delivery ratio generated by FAR based cache replacement. So graph shows that proposed approach of HMM gives highest cache hit ratio for packet transmission.
  • 4. Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 www.ijera.com 137 | P a g e Fig. 5 Throughput of HMM, LRU, FAR In Fig. 5 graph describes the link throughput given by HMM based, LRU based and FAR based cache replacement. Time in seconds is plotted against x-axis and throughput in number of packets is plotted against y-axis. Graphical analysis indicates that HMM based approach is caliper to generate highest throughput than LRU and FAR approach, which is really expected from real world applications. Fig. 6 Transmission Delay of HMM, LRU, FAR As shown in Fig. 6 HMM based cache replacement overcomes the unwanted delay just because of the more accurate prediction of the future location. It produces the lowest delay while transmission. Table 1 summarizes the performance evaluation of all three cache replacement policies. Delay parameter is inversely proportional to the number of packets transmitted. In FAR packet delivery ratio increases as compared to that of LRU. FAR policy gives better cache hit ratio than LRU. TABLE 1. Comparison of LRU, FAR and HMM Based cache replacement policies FAR packet delivery ratio increases as compared to that of LRU. Also when we follow FAR cache replacement policy, then throughput also increases as compared to the LRU. FAR policy gives better cache hit ratio than LRU. HMM based policy gives best results in all the three aspects. Its prediction accuracy gives benefit of better cache performance. VIII. CONCLUSION HMM based CRP considers current location of moving client. Also it considers moving direction of user and traces location histories of client. Then it predicts probable future location. HMM based CRP keeps only that data in cache, which is relevant to that predicted location. So, HMM based CRP proves most accurate replacement policy compared to the LRU and FAR. LRU considers only no. of times data item is accessed. This information is partial and abstractive in order to make replacement decisions. FAR considers current location and movement direction of client to take replacement decisions. FAR neglects temporal properties of data item leading to less accuracy. IX. ACKNOWLEDGEMENTS The authors would like to express their gratitude to Terna Engineering College, Nerul, Navi Mumbai. for technical support offered required for experimental evaluation. Also we express special thanks to the “Network Simulator version 2” Training and Workshop session held at Sinhgad Institute Of Technology Lonavala, Pune. REFERENCES [1] http://www.personal.psu.edu/sxr360/blogs/ mobileadhoc networkpic [2] http://www.watblog.com/2008/04/16/mobile -positioning-and-location-based-services-an- insight-into-the-future-of-mobile/ [3] Ajey Kumar, Manoj Misra, Anil K. Sarje, “A Predicted Region based Cache Replacement Policy for Location Dependent Data in Mobile Environment”,I. J. Communications, Network and System Sciences. 2008; 1: 1-103. [4] D. Barbara, “Mobile Computing and Databases: A Survey,” IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 1, pp. 108-117, January/February 1999. [5] D. Barbara and T. Imielinski, “Sleepers and Workaholics: Caching Strategies in Mobile Environments,” In the Proceedings of the ACM SIGMOD Conference on Management of Data, Minneapolis, USA, pp. 1-12, 1994. [6] E. O‟Neil and P. O‟Neil, “The LRU-k page replacement algorithm for database disk LRU FAR HMM Preferable Pdr High Low Highest Hmm Through Put High Low Highest Hmm Delay Medium High Low Hmm
  • 5. Bhakti D. Shelar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 7( Version 3), July 2014, pp.134-138 www.ijera.com 138 | P a g e buffering”, In the Proceedings of the ACM SIGMOD, Vol. 22, No. 2, pp. 296-306, 1993. [7] Q. Ren and M. H. Dhunham, “Using Semantic Caching to Manage Location Dependent Data in Mobile Computing,” In the Proceedings of 6th ACM/IEEE Mobile Computing and Networking (MobiCom), Boston, USA, pp. 210-221, 2000. [8] B. Zheng, J. Xu and D. L. Lee, “Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments,” IEEE Transactions on omputers, Vol. 51, No. 10, pp. 1141-1153, October 2002. [9] K. Lai, Z. Tari and P. Bertok, “Location– Aware Cache Replacement for Mobile Environments,” IEEE Global Telecommunication Conference (GLOBECOM 04), Vol. 6, pp. 3441-3447, 29th November- 3rd December 2004. [10] S. Dar, M. J. Franklin, B. T. Jonsson, D. Srivastava and M. Tan, “Semantic Data Caching and Replacement,” In the Proceedings of the 22nd International Conference on Very Large Databases (VLDB), pp. 330-341, 1996. [11] Balamash and M. Krunz, “An Overview of Web Caching Replacement Algorithms,” IEEE Communications Surveys & Tutorials, Vol. 6, [12] D. L. Lee, W.-C. Lee, J. Xu and B. Zheng, “Data Management in Location-Dependent Information Services,” IEEE Pervasive Computing, Vol. 1, No. 3, pp. 65-72, July 2002. [13] J. Jing, A. Helal and A. Elmagarmid, “Client-Server Computing in Mobile Environments,” In the Proceedings of the ACM Computing Surveys, Vol. 31, No. 2, pp. 117-157, June 1999. [14] T. Camp, J. Boleng and V. Davies, “A Survey of Mobility Model for Ad Hoc Network Research,” Wireless Communication & Mobile Computing (WCMC): Special Issue on Mobile AdHoc Networking: Research, Trends and Applications, Vol. 2, No. 5, pp. 483-502, 2002. [15] A. Balamash and M. Krunz, “An Overview of Web Caching Replacement Algorithms,” IEEE Communications Surveys & Tutorials, Vol. 6, No. 2, pp. 44-56, 2004. [16] I. A. Getting, “The Global Positioning System,” IEEE Spectrum, Vol. 30, No. 12, pp. 36-47, December 1993.