A Comparative Study on Temporal Mobile Access Pattern Mining Methods

Abstract

 Mobile users behavior patterns is one of the most critical issues that need to be explored in mobile agent systems. Recently the algorithms of discovering frequent mobile user’s behavior patterns have been studied extensively. Existing mining methods have proposed frequent mobile user's behavior patterns statistically based on requested services and location information. Therefore, other studies considered that the mobile user's dynamic behavior patterns are usually associated with temporal access patterns. In this paper, temporal mobile access pattern methods are studied and compared in terms of complexity and accuracy. The advantages and disadvantages of these methods will be summarized as well.

Authors and Affiliations

Hanan Fahmy , Maha A. Hana , Yahia K. Helmy

Keywords

Related Articles

Arabic Text Categorization using Machine Learning Approaches

Arabic Text categorization is considered one of the severe problems in classification using machine learning algorithms. Achieving high accuracy in Arabic text categorization depends on the preprocessing techniques used...

Forecasting Feature Selection based on Single Exponential Smoothing using Wrapper Method

Feature selection is one way to simplify classification process. The purpose is only the selected features are used for classification process and without decreasing its performance when compared without feature selectio...

Towards Quranic reader controlled by speech

In this paper we describe the process of designing a task-oriented continuous speech recognition system for Arabic, based on CMU Sphinx4, to be used in the voice interface of Quranic reader. The concept of the Quranic re...

Investigating the Idiotop Paratop Interaction in the Artificial Immune Networks

The artificial immune system is a new computational intelligence technique that has been investigated for the past decade. By reviewing the literature, two observations were found that could affect the network learning p...

Junction Point Detection and Identification of Broken Character in Touching Arabic Handwritten Text using Overlapping Set Theory

Touching characters are formed when two or more characters share the same space with each other. Therefore, segmentation of these touching character is very challenging research topic especially for handwritten Arabic de...

Download PDF file
  • EP ID EP129979
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Hanan Fahmy, Maha A. Hana, Yahia K. Helmy (2012).  A Comparative Study on Temporal Mobile Access Pattern Mining Methods. International Journal of Advanced Computer Science & Applications, 3(3), 136-139. https://europub.co.uk/articles/-A-129979