A Comparative Study on Temporal Mobile Access Pattern Mining Methods
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 3
Abstract
Mobile users behavior patterns is one of the most critical issues that need to be explored in mobile agent systems. Recently the algorithms of discovering frequent mobile user’s behavior patterns have been studied extensively. Existing mining methods have proposed frequent mobile user's behavior patterns statistically based on requested services and location information. Therefore, other studies considered that the mobile user's dynamic behavior patterns are usually associated with temporal access patterns. In this paper, temporal mobile access pattern methods are studied and compared in terms of complexity and accuracy. The advantages and disadvantages of these methods will be summarized as well.
Authors and Affiliations
Hanan Fahmy , Maha A. Hana , Yahia K. Helmy
Arabic Text Categorization using Machine Learning Approaches
Arabic Text categorization is considered one of the severe problems in classification using machine learning algorithms. Achieving high accuracy in Arabic text categorization depends on the preprocessing techniques used...
Forecasting Feature Selection based on Single Exponential Smoothing using Wrapper Method
Feature selection is one way to simplify classification process. The purpose is only the selected features are used for classification process and without decreasing its performance when compared without feature selectio...
Towards Quranic reader controlled by speech
In this paper we describe the process of designing a task-oriented continuous speech recognition system for Arabic, based on CMU Sphinx4, to be used in the voice interface of Quranic reader. The concept of the Quranic re...
Investigating the Idiotop Paratop Interaction in the Artificial Immune Networks
The artificial immune system is a new computational intelligence technique that has been investigated for the past decade. By reviewing the literature, two observations were found that could affect the network learning p...
Junction Point Detection and Identification of Broken Character in Touching Arabic Handwritten Text using Overlapping Set Theory
Touching characters are formed when two or more characters share the same space with each other. Therefore, segmentation of these touching character is very challenging research topic especially for handwritten Arabic de...