Documente Academic
Documente Profesional
Documente Cultură
CO
statistic is generated (line 07 to line 26).Finally,
the clustering result with the highest quality during
the tested.
Example:
The best affinity threshold t found using highest CO.
After 1
st
clustering output:
Fig.6. Clustering after 1
st
iteration
Similarity matrix for newly formed clusters:
Fig.7. table formed after clustering
The final clustering result:
Fig.8. Finally formed clusters
3.2 Segmentation of Mobile Transaction:
In a mobile transaction database, similar mobile
behaviors exist under some certain time segments.
Hence, it is important to make suitable settings for
time segmentation so as to discriminate the
characteristics of mobile behaviors under different
time segments. A GA-based method to automatically
obtain the most suitable time segmentation table with
common mobile behaviors is proposed. Fig. 9 shows
the procedure of proposed time segmentation method,
named Get Number of Time Segmenting Points
(GetNTSP) algorithm. The input data are a mobile
transaction database D and its time length T (line 01).
The output data are the number of time segmenting
points (line 02). For each item, the total number of
occurrences at each time point is accumulated (line
07 to line 11). At each time point with the largest
change rate (line 13) is obtained. The change rate is
defined as (C[i+1]-C[i])/(1+C[i]), where C[i]
represents the total number of occurrences for the
item at time point i. Then, count occurrences of all
these time points (line 15), and find out the satisfied
time points whose counts are larger than or equal to
the average of all occurrences from these ones, and
then, take these satisfied ones as a set of the time
point sequence (TPS) (line 17). In the time point
sequence, the average time distance a between two
neighboring time points is calculated (line 18).
Algorithm:
Fig. 9. The GetNTSP algorithm.
The number of neighboring time point pairs, in which
the time distance higher than , is calculated (line 19
to line 23). The result represents the time
segmentation count (line 24). After obtaining the
number of time segmenting points, use genetic
algorithm to discover the most suitable time intervals.
Example:
Time points with the largest change rates are
5, 10, 13, 30, 5, 28, 10, 7,20, 30, 25, and 28.
These time points can be sorted as 5(2),7(1),
10(2), 13(1), 20(1), 25(1), 28(2), and 30(2),
where t(n) indicates that the number of time
points t is n.
The Time Point Sequence (TPS) :{5, 10, 28,
and 30} as average number of time points is
12/8=1.5
Calculate a , 25/3= 8.33
Only 1 interval in 10 and 28 larger than
8.33.
So, time segmenting point =1.
Use Genetic algo. with fitness function :
Nc-total no. of cells Ns-total no of services
Ti[c, s]-request count of cell c & service s in time
interval
Ti avg. service request count
3.3 Discovery of CTMSPs:
The entire procedures of CTMSP-Mine algorithm can
be divided into three main steps:
1) Frequent-Transaction Mining,
2) Mobile Transaction Database Transformation, and
3) CTMSP Mining.
3.3.1 Frequent Transaction Mining:
Mine Frequent transactions (F -Transactions)
using modified Apriori Algorithm.
At first, count support of each cell and service in
each user cluster
time interval
Keep frequent 1-transactions with minimal
support threshold TSUP.
A candidate 2-transaction is generated by joining
two frequent 1-transactions if -
user clusters
time intervals
cells are same.
Repeat same procedures until no candidate
transaction is generated.
Construct service mapping table to transform
services into F-transactions to reduce time
TABLE 3
Frequent Transactions
The frequent transactions are shown in Table 3. Here,
a service mapping table is constructed to transform
services into F-Transactions in Table 3. For each
service set, we use a contiguous and unique symbol
LSi (Large Service i) to represent it. The mapping
procedure can reduce the time required to check if a
| |
( )
( )
+
= = =
|
.
|
\
|
=
1
1 1 1
2
,
1
) (
X Len
i
Nc
c
Ns
s
i i T s c T
Ns Nc
X Fitness
mobile sequential pattern is contained in a mobile
transaction sequence.
3.3.2 Mobile Transaction Database
Transformation:
The main objectives and advantages are:
1) service sets can be represented by symbols for
efficiently processing
2) transactions whose support is less than the
minimal support threshold can be eliminated to
reduce the size of database.
3.3.3 CTMSP Mining:
In this phase, Frequent 1-CTMSPs are obtained
in the frequent-transaction mining.
Utilization of a two-level tree named (CTMSP-
Tree).
The internal nodes store the frequent mobile
transactions
The leaf nodes store the corresponding
paths.
Every parent node of a leaf node is designed
as a hash table stores:
the combinations of user cluster tables
time interval tables.
CTMSP-Mining Tree obtained is:
Fig.10. CTMSP-Tree. (a) The part of frequent 2-
CTMSPs. (b) 3-CTMSPs. (c) 4-CTMSPs
3.4 Prediction Strategies:
3 prediction strategies :
Patterns selected only from the corresponding
cluster a user belong.
Patterns selected only from the time interval
corresponding to current time.
Patterns selected only from the ones that
match the users recent mobile behavior.
If exist more than one pattern that satisfy above
conditions, the one with the maximal support is
selected.
SUMMARY AND FUTURE SCOPE
A novel method CTMSP-Mine ,
for discovering CTMSP in LBS environments
prediction strategies to predict the subsequent
user mobile behaviors using CTMSP is
proposed combining user cluster and time
interval.
This method is not yet applied on real data.
Future Scope:
As above techniques are not yet implemented on
real data, the work is to implement all the above
algorithms for real data and obtain results. And then
for the same by applying different strategies,
efficiency of the mining can be tested in future.
BIBLIOGRAPHY
[1] Eric Hsueh-Chan Lu,Vincent S.Tseng and Philip
S. Yu, Mining Cluster-Based Temporal Mobile
Sequential Patterns in Location-Based Service
Environment, IEEE Trans. Knowledge and
Data engineering , vol. 23, no. 6, June 2011.
[2] J. Han and M. Kamber, Data Mining: Concepts
and Techniques, second ed., Morgan
Kaufmann, Sept. 2000.
[3] A. Ben-Dor and Z. Yakhini, Clustering Gene
Expression Patterns, J. Computational Biology,
vol. 6, no. 3, pp. 281-297, July 1999
[4] V.S. Tseng and C. Kao, Efficiently Mining
Gene Expression Data via a Novel Parameterless
Clustering Method, IEEE/ACM Trans.
Computational Biology and Bioinformatics, vol. 2,
no. 4, pp. 355-365,Oct.-Dec. 2005.
[5] C.H. Yun and M.S. Chen, Mining Mobile
Sequential Patterns in a Mobile Commerce
Environment, IEEE Trans. Systems, Man, and
Cybernetics, Part C, vol. 37, no. 2, pp. 278-295, Mar.
2007.
[6] V.S. Tseng, H.C. Lu, and C.H. Huang,
Mining Temporal Mobile Sequential Patterns in
Location-Based Service EnvironmentsProc. 13th
IEEE Intl Conf. Parallel and Distributed Systems,
pp. 1-8,Dec. 2007.
[7] V.S. Tseng and W.C. Lin, Mining Sequential
Mobile Access Patterns Efficiently in
Mobile Web Systems, Proc. 19th Intl
Conf. Advanced Information Networking
and Applications, pp. 867-871,Mar. 2005.
[8] Mr.A.Dubey and Prof.S.K.Shandilya,Exploiting
need of data mining services in mobile
computingenvironments,IntlConf.Computational
Intelligennce and Networks 2010