Вы находитесь на странице: 1из 28

Abstract/Synopsis

Mobile & wireless applications provide vital benefits to any business, worker productivity , reduced processing costs ,heightened accuracy competitive advantage. The prime necessity in the world of open computing and communications is to check the Integrity of information transmitted over(or) stored in an unreliable information. In the next future can be learned from studying data captured from your cell phone. At the centre for advanced information systems, we conduct extensive research on using knowledge discovery techniques such as frequent pattern mining, classification& clustering to create new mobile applications(or) to enhance existing mobile application include e-commerce systems, databases , e-mail-systems , search engines & web browsers. We investigate both the functionalities and operational efficiencies of mobile applications and determine the kinds of knowledge require for enhancing them. We also concentrate on algorithms for discovering knowledge from mobile data & evaluate their performance and also we study how the discovered knowledge and

mining algorithms can be integrated with the operational systems turning the knowledge in to actions. A new innovation in data mining field is mobile data mining. Mobile data mining has various key area like infrastructure for mobile devices, algorithm for mobile data mining & Incorporating mobile mining results. Software Infrastructure and H/w infrastructure are the most important factors to analyze the performance analysis in wireless devices through web services. We focus on hardware infrastructure of mobile devices (*or) handheld devices which is used to create a strong background of mobile communication &mobile internet. At the point of software infrastructure on mobile devices ,we concentrate on mobile content/context information storage &retrieval in wireless devices. Mobile data mining has the various aspects like GIS ,desktop items, favorites & real time application. Mobile data mining real time application contains mainly mobile and wireless applications provide vital benefits to any business, worker productivity reduced processing costs, heightened accuracy competitive advantages . Two types of Applications are mainly focused(in my thesis) . There are wireless Application & messaging Application Architecture. These are also challenge in the mobile application. Functionalities of mobile applications are handled with the help of algorithms which is used for discovering knowledge and evaluate of performance. Further study

how the discovered knowledge &mining algorithms can be integrated with the operational systems. We focused both the functionalities, operational efficiencies of mobile applications &determine the kinds of knowledge require for enhancing them. The Mobile network provides locator system, GPS, LBS, Mobile positioning & wireless communication. A GPSbased mobile service locator system to help individuals in different walks of life, find addresses & locate their services of interest using mobile service providers. GPSmobile positioning &handset mobile positioning. The first proposed scenario that discuss the networkbased mobile positioning technology & the second proposed scenario that discuss the network-based mobile positioning technology & the second proposed scenario is handset mobile positioning . A main point of my study to compare the GPS-based &mobile based services. The proposed study /system is discussed to determine the proximity distances between the user & the locations of the desired service. The Network-based computing environment has introduced a new & important dimensions of distributed sources of data. The Advent of laptops, palmtops ,handheld embedded systems &wearable computer is also making ubiquitous access to a large quantity of distributed data. Advanced analysis of distributed data for extracting useful knowledge in the next natural step in the

increasingly connected world of ubiquitous &distributed computing. most of the popular data mining algorithm are designed to work for centralized data & they often do not pay attention to the resource constraints of distributed &mobile environments.

((((((Searching how mobile context information are managed in wireless devices (like various cell phones. Here hardware infrastructure and software infrastructure is very important. Hardware components & software algorithms to be considered for better performance) and also mobile context aware & unaware application concepts for writing synopsis & literature review task.- related ))))

Introduction
Technology now allow us to capture & store vast quantities of data. Finding patterns, trends & anomalies in these dataset and summarizing them with simple quantitative models, is one of the ground challenge of the information age turning data into information age turning data into information & turning information into knowledge. There has been stunning progress in data mining and machine learning. The synthesis of statistics, machine learning information theory & computing has created a solid

science with a firm mathematical base & with vey powerful tools. This is the milestone in the synthesis of data mining data analysis, Information theory & machine learning. To translate a business problem in to a data mining problem in to a data mining problem ,it should be reformulated as one of the 6 data mining Tasks introduced. 1. Classification 2. Estimation 3. Prediction 4. Afinity Grouping 5. Clustering 6. Description&profiling

Milestones of Madurai TELECOM


1924 First manual telephone exchange with 92 working lines was commissioned on 01.09.24 1935 Madurai was linked with major towns tirunelvel,Tuticorin,Rameshwaram & others. 1947 Trunk Exchange Commisioned on 08.07.47 1961 First Commisioned. Automatic Exchange

1984 Trunk Auto Exchange Commisioned

1988-99 Computerisation booking newphones.

introduced

for

1991-92 First Electronic Exchange 48 level commissioned. 1992-1993 - Telephone Billing Computerised 1993-94 Working lines reached 50,000.Subscribers were issued detailed particulars of STD Calls made with telephone bill 1995-96 EWSD,a siemans Newtech telephone Exchange installed at Tallakulam,Madurai 1997-98 - Working connections 1,00,000(double in 3 years) crossed

1998-99workingconnectionscrossed 1,50,000; Internetnode commissioned; All rural exchanges under the control of GMT. 1999-2000 more than 40,000 people register for new plan connection on new drive. Registration charges during pongal offer.

The working connections in Madurai town alone exceeds 1,00,000.

Trends in Datamining Datamining is the extraction of Implicit,previously unknown & potentially useful information from data. Datamining the extraction of hidden predictive information from large databases is a powerful new technology with great potential to help companies focus on the most important information in their datawarehouses. Datamining tools predict future trends and behaviours, allowing businesses to make proactive, knowledge-driven decisions. The automated ,prospective analyses offered by datamining move beyond the analyzes of past events provided by respective tools typical of decision support systems. Datamining tools can answer business questions that traditionally were too time

consuming to resolve. They scour databases for hidden patterns,finding predictive information that experts may miss because it lies outside their expectations. Generally data mining (sometimes called data (or) knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts, costs (or)both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions(or)angles, categorize it and summarizing the relationships identified. Technically data mining is the process of finding correlations (or) patterns among dozens of fields in large relational databases.
The diversity of data, data mining tasks &data mining approaches poses many challenging research issues in data mining. The development of efficient &effective data mining methods & systems, the construction of interactive & integrated data mining environments & the application of data mining techniques to solve large application problems are important

tasks for data mining researchers, data mining system & application developers. Application exploration Scalable Methods data mining Standardization of data mining language Visual data mining new methods for mining complex types of data. Web mining Privacy protection Information Security in data mining o Mobile data mining We Provide a brand overview of selected knowledge Management datamining & text mining techniques and their use in various emerging biomedical applications.It aims to set the context for subsequent chapters. We first introduce 5 major paradigms for machine learning & data analysis including: Probalistic & statistical methods Symbolic learning & Rule induction Neural networks Evaluation based algorithms Analytical learning & Fuzzy logic &

Integration of data mining with database system, data ware house system & web database system

We also discuss their relevance & potential for biomedical research . Example applications of relevant knowledge management data mining &text mining research are then reviewed in order including: Ontologies

Knowledge management for health care Biomedical literature

Heterogeneous databases Informationvisualization& databases Multimedia

Data& text mining Literature & biological data

for

health

care

We conclude, with discussion of privacy & confidentiality issues of relevance to biomedical datamining.

Datamining: Evaluation of Retrival systems


For retrieval by content , however the problem of evaluating the performance of a particular retrieval algorithms (or) technique is more complex. The primary difficulty is that the ultimate measure of a retrieval information to the user. Thus, retrieval performance in a real world situation is inherently subjective. Retrieval is a human-centered, interactive process, which makes performance evaluation difficult. This is an important point to keep in mind. The convergence of computing & communication has produced a society that feeds on information. Yet, most of the information is in its raw form :data. If data is characterized as recorded facts, then information is the set of patterns/expectation, that underlie the data. There is a husge amount of information locked up in databases-information that is potentially important but has not yet been discovered articulated. Our mission is to bring it forth.

Datamining: Biological Data Mining & Bio informatics


The fast progress of biomedical &bioinformatics research has led to the accumulation & publication on the web of vast amount of biological &bio informatics data. However, the analysis of such data poses much greater challenges the traditional data analysis methods. For example ,genes & proteins are gigantic in size (e.g., a DNA sequence could

be in billions of base pairs) very sophiscated in function and the patterns of their interactions are largely unknown. Thus it is a fertile field to develop sophiscated data mining methods for in depth bio-informatics research. We believe substantial research is badly needed to produce powerful mining tools in many biological & bio informatics subfields, including comparative genomics, evoluation & phylogency, biological data cleaning and integration, biological sequence analysis, biological image analysis, biological literature analysis(e.g systems biology) From this point of view data mining is still very young with respect to biology and bioinformatics application. Substantial research should be conducted to cover the vast spectrum of data analysis tasks.

Datamining : Mobile Datamining


The prime necessity in the world of open computing and communications is to check the Integrity of information transmitted over(or) stored in an unreliable information. In the next future can be learned from studying data captured from our cellphone. At the centre for advanced information systems, we conduct extensive research on using knowledge discovery techniques such as frequently pattern mining, classification & clustering to create new mobile application. Examples of such mobile applications include e-commerce systems, databases, e-mail systems, search engines & web browsers. We investigate both the functionalities and operational efficiencies of mobile applications and determine the kinds of knowledge require for enhancing them.

We also develop algorithms for discovering knowledge from mobile user data & evaluate their performance. We further study how the discovered knowledge and mining algorithms can be integrated with the operational systems turning the knowledge in to actions. Intensive Research Area in this world Mobile data mining : the meaning and impact of the mobile data mining in Data mining field, diversity of mobile data mining & mobile data mining security issues. Unique problems(usage & challenges in mobile devices) wireless devices need unconventional approach for data retrieval &processing. Mobile data retrieval &processing is taking place in the perfect manner. A few specific aims are as follows: Additional improvements in mobile content information retrieval &processing(mobile data) are necessary in mobile data mining to facilitate high quality data retrieval &processing in mobile data. To develop a user friendly, GUI based on object oriented programming paradigm for the implementation of the algorithms proposed. Challenges of interface design for mobile devices The single most important concept to master when designing mobile devices is Context. The context in which an application is used & the context of how information is input are both key issues; Each must be understood before a well crafted design may be implemented. When these two notions of context are explored; it becomes clear that designing for a mobile devices can lead to a solution that is worlds different than its desktop equivalent.

Mobile devices are excellent at connecting users to information; and while consumption of information is likely the largest segment of mobile device to perform important tasks is a usage segment that deserves significant attention. This is because generative work conducted on mobile devices tends to be tactical in nature &demands a sense of immediately. Users have a very specific need and desire to accomplish their goal in the easiest & fastest way possible. This fact alone helps explain why mobile interfaces are designed the way they are: i) ii) iii) iv) Feature sets are optimized to streamline common use cases Use typography to show hierarchy and importance Features are progressively displayed Large buttons are used to make interactions actionable

Introduction to Mobile computing


Mobile computing is a technology that allows transmission of data, via computer, without having a fixed physical connection. Mobile computing is increasingly becoming more &more popular as people need information even on the more in this rapid changing information world. It has 2 parts there are mobile computers/mobile devices & wired network of computers. It requires Wireless network to support outdoor mobility & handoff from one network to the next at a pedestrian (or) vehicular speed. Ex: Traveler in car using laptop connected with a GSM phone is engaged in mobile computing. Principles of Mobile Computing Mobile voice communication is widely established through out the world and has a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send &

receive the data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This is the solution to the biggest problem of business people on the move-mobility. Applications of Mobile computing: Nowadays Applications of Mobile computing found in the various areas like Estate agents, courts, companies, credit card (pos) verification, stock information control, emergency services & Electronic mail. Mobile computing in SMS security is one of the popular application.SMS Spoofing ,SMS Threats, SMS Virus are also considered in SMS security. Early helper, cryptograf messaging, Best jotter, Kryptext,Paypal algorithms are used to handle the SMS security. Mobile security service are handled through Softwares. They are pointed the System level security & Network level security. Message security techniques to prevent introducers from tampering with inter process messages. These techniques perform encryption with public keys/session keys, which are securely distributed to communicating processes authenticate each other through trusted third party . A user process access a remote resource through a message sent to the resource coordinator process. Such a message travel over public networks &pass through communication processors that operate under local operating systems. Communication processors employ the store-and forward technique to route a message to its destination. Thus messages are exposed to observation& interference by external entities, there by raising new security threats that do not arise in conventional system. Such threats(Securing threats in a network) can be classified as follows: leakage(release of message contents

to unauthorized users),tampering(modification of message contents)stealing(use of system resources without authorization),denial of service to authorized users(distribution of access to resources. Security threats are addressed through attacks on integrity &authenticity are addressed through a combination of these 2 means: message security techniques are employed to attacks on message& authentication of remote users Wireless Security Wireless security is the prevention of unauthorized access/damage to computers using wireless networks. Wireless network are very common. Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has greater benefits. Hackers found wireless network relatively easy to break into and even use wireless technology to crack in to wired networks. As a result, it is very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources.

Wireless intrusion prevention systems are commonly used to enforce wireless security risks associated with the current wireless protocols & encryption methods, and in the carelessness & ignorance that exists at the user and corporate IT level. Cracking methods have become much more sophisticated &innovative with wireless. A cracker could sit out in the parking lot & gather information from it through laptops &/or other devices as handhelds or even break in through this wireless cardequipped laptop & gain access to the wired network. Accidental Association(Wireless Vulnerability),Malicious Association, Ad-hoc networks(peer-to-peer networks between wireless computers that do not have an access point in between

them),Non-traditional Networks(Bluetooth),identify theft(MAC spoofing) are the types of unauthorized access. Crackers able to listen in on network traffic and identify the MAC address of a computer with network privileges. Most wireless systems allow some kind of MAC filtering. Most wireless systems allow some kind of MAC Filtering. There are Man-in-the middle attacks, Denial of service, Network injection, caffe latte attack..Wireless Intrusion prevention systems is the most robust way to counteract wireless security risks. Wireless security best practices are MAC ID filtering, static IP addressing

Research Objective:

An Architecture for mobile content delivery systems by investigating representative usage scenarios has been proposed. An event architecture for mobile computing that addresses 2 key requirements of terminal mobility & user mobility has been proposed Real-time delivery of information relevant to an event by pre fetching and caching information based on the events predicted to occur in the next future.

Real time delivery of information relevant to an event by prefetching and caching information based on the events predicted to occur in the near future. Real time information delivery system based on an event is context & content.

Context aware services in mobile environment have been proposed while considering users contextual information (or) other context attributes such as location.

..

Aim,Need & Objective of the study: A few specific aims are as follows: *Additional improvements in mobile content information retrieval & processing are necessary in mobile data mining to facilitate high quality data retrieval & processing in mobile data. *To develop a user-friendly, GUI based on object-oriented programming paradism for the implementation of the algorithms proposed. Performance analysis of mobile content information small device(wireless device/mobile devices) using web services.

Usually the web services are handled normal pc-based. Nowadays this web services are handled by handheld devices like mobile phones, laptop, PDAetc. -how the mobile content information is performed in small device(wireless devices like various mobile phones).Research tools(Hardware & Software Infrastructure) Especially Software Infrastructure Tool is most important to analyze the performance analysis of mobile data mining in small devices through web services. WebServices are handled with the the server,Browser & client. Here Client is an Mobile (or) handheld device.Browser is like Mozila firefox,internet Explorer,opera etc., Server is an mainframe Computer maintained the various servers like mobile devices servers(or) handheld devices server

Objectives of the study: 1.Study of characteristics of mobile datamining 2. Study the mobile context information in wireless devices like.? 3. Determine & Evaluate the important factor for mobile data mining in wireless devices. 4. Study the major influences of data mining in mobile phones. 5. Measure the level on performance of mobile context information in various cellphones

Scope of the study:

The study will benefit to improve the storage and retrieval of mobile content information in various cellphones /wireless devices Unique Problems(usages & challenges in mobile devices) wireless devices need unconventional approach for mobile data retrieval & processing.

Research focus as on date 18/05/2012(8.30


pm) I got it from the Mr.S.P.Kapilan-MKU college phone call. ---- Datamodels are pointed (i.e) datamodels in mobile webservices. to focus previous

----Data models means How to display the mobile content information in various cellphones using webservices.(REVIEW OF LITERATURE)

Literature Review/Survey
Mobile devices in the workplace both IT sanctioned and personally owned devices are proliferating because of the utility they provide & their larger role in enabling employees to be more productive when away from the office .However

mobile devices present unique It & business management and archieving challenges.

Organizations sizes and in all industries must deploy mobile device management systems that will enable devices to be managed properly and that will archieve content adequately.
1) Churn prediction in Telecommunication using Data mining Technology In this paper discusses * The biggest revenue leakages in the telecom industry are increasing customers churn behavior. Such customers create an undesired & unnecessary financial burden on the company. This financial burden results in to huge loss of the company& ultimately may lead to sickness of the company; detecting such customers well in advance is the objective of this research paper. [Prediction of customers who are at risk of leaving a company is called as churn(customers can move to a competitor,a process calledchurning.churning is a costly process for the company,as it is muchcheaper to retain a customer than to acquire a new one) prediction in Telecommunication] * Insolvency prediction and Fraud detection are also discussed. Building a model (training set, the validation set and the test set) with the help of several data mining tools and METACAB(it has neural network toolbox) was found to be the most suitable for

creating and training a decision support system that can discriminate between churning and not churning customers ,it supports with many algorithms. Back propagations algorithm is used for the above research work. 2) Mobile datamining on smalldevices through webservicesdomenic Talia & Paolotrunfio,DEIS,university of Calabria - In this paper discussses *perform analysis of data stored in repositories far away from the site wher users are working,allowing them to generate knowledge regardless of their physical location. *pervasive datamining of databases from mobile devices through the use of webservices. * the use of web services in mobile environments *the design and implementation of a system we developed for mobile data mining based on the web service technology. 3) Ambieagents: A scalable Infrastructure for mobile & contextaware Information services. -In this research paper, we present Ambieagents, an agent-based infrastructure for context-based information delivery for mobile users& the overall architecture and particularly the agent-system and its main features. 4) Service mobility support for pervasive grid based on SIP The traditional manner misses the situation that services may migrate from one device to another and will limit the development of pervasive grid application(personal computing, load balance, etc.,). In this paper,discusses,

* we transfer the focus from mobile device to mobile service & view each service as an individual network node. We adopt session initiation protocol(SIP) to build pervasive grid communication environment & propose a hierarchical SIP architecture to reduce the hand-off frequency caused by the increasing network nodes. operation details are given and application scenario is presented . * The goal of next generation grids, pervasive computing models are the new models attract a lot attention in last few years. The current trend is to integrate the two domains called pervasive grid, where mobile devices can access and provide services. *most current researches adopt the concept that services run in a device & migrate with the device. System developers deal with the problems respectively, they adapt device mobility method to handle the former & service registry system to solve. 5) A GPS-based Mobile Dynamic Service Locator System Hassan I.Mathkoura Department of Computerscience,King saud University,Riyadh 11653,Saudiarabia.
- In

this paper, Network based Mobile positioning&Handset Mobile positioning technologies are introduced. Hardware and software requirements are discussed for the implementation of client-side Component (HSFC-Handset Service Finder Component),Server-side finder Component(SSFC),Test data and Test scenarios are used for the implementation of the system architecture scenario are also described.

-Here we propose & develop a GPS-based mobile service locator system to help individual s in different walks of life, find addresses & locate their services of interest using their mobile devices.

- GPS-based

Locator system is able to determine the proximity distances between the user and the locations of the desired service. It is flexible & extendible to easily incorporate additional mobile service providers & new services. It is allow for a more accurate location calculation rather the Handset based service locator system.

6)Performance Evaluation of RESTful web services for mobile devices 7)Mobile Mind : A fully Mobile platform based Machine learning APPLication. In this paper SVR support Vector Regression , KRLS(kernel Recursive Least squares) Algortihms are selected & adopted in mobile mind due too some reasons. 8) Context-aware Timely Information delivery in Mobile Environments In this paper, *learns Motivating scenario , challenges & contributions, issues in Real time Information Delivery, State chart based domain modeling, Details of Information Delivery System(eg: cricket game ) *propose a real time information delivery system based on an events context & content, context-aware services in mobile environment have been proposed while considering users contextual information (or) other context attributes such as location * an event architecture for mobile computing that addresses 2 key requirements of terminal mobility and user mobility has been proposed.thie approach does not consider context of the event as well as limitations of the access devices. An architecture for mobile content delivery systems by investigating representative usage scenarios has been proposed.

* A new method of personalizing mobile advertisement by considering not only the users location but his/her interest is proposed. Limitations of mobile devices, unreliability of the network and the different users interest for the selection & delivery of multimedia information to mobile devices is addressed. * A personalized information delivery system that reduces the storage, bandwidth and processing power requirements and simplify user interaction by using media conversion to generate presentations that fit the device and/or user capabilities is proposed. * A novel system for delivery permission based location-aware mobile advertisements to mobile phones is introduced. * Design & implementation of a system for advertising for the mobile e-commerce user is described & subsequently it reflects upon the possibility of using user emotion to increase effectiveness of the advertising. *no explicit attempt is made for timely delivery of such personalized information in a way to ensure the validity as well as usefulness of the content being delivered. * to focus the survey of research on context aware systems & applications looking at the types of context used and models of context information, at systems that support the collection and dissemination of context, and at applications that adapt to the changing context is presented. * Challenges presented. and opportunities of wireless advertising is

* To identify factors that influence the effectiveness of a mobile messaging advertising .

In this paper propose a real time information delivery system based on an events context (context in mobile environments). Here we measured the effectiveness of our approach as compared to a context. Unaware approach to event prediction experiments demonstrate tat our approach has a superior performance, resulting in a)better prediction accuracy b) the delivery of the most relevant information most of the time ; & c)effective cache management in mobile devices. Here we concentrate mobility,caching,contextawareness,performance. Information becomes out of context is delivered along with an event notification that is delayed. context aware services in mobile environment have been proposed while considering users contextual information (or) other context attributes such as location. In this paper we propose a real time information delivery system based on an events context & content.

9) Key issues to consider in Mobile device management An Osterman Research White paper published May2011 Sponsored by Notify Technology This whitepaper focuses on the need to adequately manage mobile devices & data as well as the risks that organizations face from the rapid growth of mobile device use in the work place. It was sponsored by notify information on the company is provided at the end of this document. *Growing use of personal devices in the workplace. *managing mobile devices is difficult & risky *content management for mobile devices is more difficult than for traditional platforms

-Content management for mobile devices as well as management of the devices themselves is more difficult that for traditional platforms like desktop computers & corporate servers. That makes mobile management more problematic more timeconsuming & potentially riskier. -There are different kinds of mobile data-mobile data consists of many different types of content that need to be managed in a granular way. For example, a mobile device can send, receive (or)generate email, webmail, files, sms/text messages, social media content, geo location information and other types of data. For example, an email sent from a registered representative to a client (or) an email sent by a companys senior manager to the companys internal legal counsel will need to be archieved.

Book Name: 1.Datamining : Next generation challenges and Future Directions Edited by Hillol kargupto, Anupamjoshi ,Krishnamoorthy sivakumar & yelna Yesha. Pervasive, Distributed & Stream Data mining Research issues in Mining & monitoring of intelligent data.

A consensus framework for integrity Distributed clusterings under limited knowledge sharing. Design of Distributed Data mining applications on the knowledge grid. Efficient Data reduction methods for on-line Association Rule Discovery

Discovering Recurrent Events in multichannel Data Streams using unsupervised Methods. Counter terrorism, privacy and data mining(inductive logic program with for link Discovery) Relational Data mining, Data mining for counter terrorism, MINDS Defining privacy for Data mining

Вам также может понравиться