Академический Документы
Профессиональный Документы
Культура Документы
(Approved By AICTE, Accredited By (NBA & ISO 9001 2000 Certified)
GREEN FIELDS, VADDESWARAM.
Term Paper Report on
A data mining approach for location
prediction in mobile environments
Guided by Submitted By
P.V.V.Prasad kvr.Anjaneyulu (L8CS340)
Lecturer K.Venkatesh (Y7CS312)
Department of CSE N.Mahesh (Y7CS244)
P.Sangram (Y7CS288)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
20102011
Literature Survey
1. Predictive mobility support for QoS provisioning in mobile wireless
environments
A. Aljadhai, T. Znati
This paper presents a predictive and adaptive scheme to support timed-QoS that
guarantees in pico- and micro-cellular environments.
The proposed scheme integrates the mobility model into the service model to achieve
efficient network.
The mobility model uses a probabilistic approach to determine the most likely cluster
to be visited by the mobile unit.
The admission control is invoked when a new call arrives or an existing call performs
a handoff to verify the feasibility of supporting the call.
The most successful approach towards this goal has been the exploitation of the
user’s access history to derive predictions.
The caching of web documents at various points in the network (client, proxy, server)
has been developed to reduce the latency.
3. Movement-based location update and selective paging for PCS networks
In fact, each mobile terminal only keeps a counter of the number of cells visited.
This paper presents a mobile tracking scheme that exploits the predictability of user
mobility patterns in wireless PCS networks
A mobile shares the same prediction information with the network and reports its new
location whenever it reaches some threshold distance away from the predicted
location.
In this paper we deal with the problem of how to predict the position of a mobile
client.
The network mobility gives rise to some new and important problems like location
management and the bandwidth allocation problems.
The location management allows the system to keep the user’s location knowledge
(exact or approximate) in order to be able to locate him.
The paging procedure consists of sending paging messages in all the locations (cells)
where the mobile client could be located.
6. GPS-based predictive resource allocation in cellural networks.
S. Rajagopal, R.B. Srinivasan, R.B. Narayan, X.B.C. Petit.
Here we propose that GPS receivers be interfaced with the mobile terminals to
provide the location information.
A new architecture has been proposed, in which the cell assignment is handled
dynamically through estimation of the location of mobile terminals by a resource
allocation center.
The simulation results show that the GPS based prediction is able to reduce the hand-
off call dropping by as much as 38% for heavy traffic conditions.
The call dropping rate can be minimized by allocating resources in neighbouring cells
based on the location of the mobile devices.
The standards exist for carrying out two-level hierarchical strategies using HLRs and
VLRs (EIA/TIA) and Interim Standard 41 (IS-41)
The authors introduce these two strategies for locating users. Different forms of
mobility in the context of PCS are discussed.
8. Exploiting data mining techniques for broadcasting data in mobile
computing environments.
Y. Saygin, O. Ulusoy.
We propose two methods aiming to reduce client access latency of broadcast data.
Our methods are based on analyzing the broadcast history using data mining
techniques.
With the first method, the data items in the broadcast disk are organized in such a
way that that the second method focuses on improving the cache hit ratio to be able to
decrease the access latency.
It enables clients to prefetch the data from the broadcast disk based on the rules
extracted from previous data request patterns.
The proposed methods are implemented on a Web log to estimate their effectiveness
PROBLEM STATEMENT
• If the mobile user stays in a cell idi more than a threshold value, before
moving to another one idi+1 at ti+1, we assume that his trajectory up until now
• We name the trajectories obtained by the above procedure as user actual paths
(UAPs).
• We assume that we have UAPs which have the form U = h(c1, c2, . . ., cn)
• By considering the mobility rules and the trajectory of a user, we predict the
movement patterns which are indeed circular and straight line patterns.
user. It is reported that as the random movements of the user increase the
prefetching.
• For effectively predicting the users_ future requests, user access patterns are
mined from the web logs of users_ previous requests and then these patterns
• DCP is used for discovering user mobility patterns from collections of recorded
mobile trajectories, and then these patterns are used for the prediction of
• At each iteration of the clustering algorithm, the two most similar clusters are
• After each merge operation, the representatives of new cluster are found to be
• The merge operation continues until the number of the clusters is reduced to a
predefined value.