Algorithms Research
p-ISSN: 2324-9978 e-ISSN: 2324-996X
2013; 2(1): 18-23
doi:10.5923/j.algorithms.20130201.03
Ch. R. Phani Kumar1, B. Uday Kumar2, V. Malleswara Rao2, Dsvgk Kaladhar3
1Department of ECE, GITAM University, Visakhapatnam, 530045, India
2Department of EIE, GITAM University, Visakhapatnam, 530045, India
3Department of Bioinformatics, GITAM University, Visakhapatnam, 530045, India
Correspondence to: Ch. R. Phani Kumar, Department of ECE, GITAM University, Visakhapatnam, 530045, India.
Email: |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
Mobile network analysis has a huge potential that provide insight into the relational dynamics of individuals. Machine learning and data mining techniques provide the behavior patterns of the mobile network data. The data transfer during all the days has produced good results in transfer of data starting from Day 1 to Day 22. Hierarchical clustering of the datasets for all the 1634 data examples in the mobile traffic dataset. Complete linkage dendrogram has been produced between 0 and 4.64. Two clusters have been produced from the present wireless mobile traffic datasets.
Keywords: Mobile Wireless Network , Data Profile, Dataset, Data Mining
Cite this paper: Ch. R. Phani Kumar, B. Uday Kumar, V. Malleswara Rao, Dsvgk Kaladhar, Prediction of Effective Mobile Wireless Network Data Profiling Using Data Mining Approaches, Algorithms Research, Vol. 2 No. 1, 2013, pp. 18-23. doi: 10.5923/j.algorithms.20130201.03.
Figure 1. Distribution plot from mobile traffic datasets |
Figure 2. SOM |
Figure 3. Seive graph |
Figure 4. Hierarchical clustering |
[1] | Shin Yuan Hunga, David C. Yenb, Hsiu-Yu Wangc, “Applying data mining to telecom churn management”. Expert Systems with Applications, vol. 31, no. 3, pp. 515–524, 2006. |
[2] | Gökhan Yavaşa Dimitrios Katsarosb, Özgür Ulusoya,Yannis Manolopoulosb, “A data mining approach for location prediction in mobile environments”. Data & Knowledge Engineering, vol. 54, no. 2, pp. 121–146, 2005. |
[3] | Nathan Eagle, Alex (Sandy) Pentland, David Lazer,”Inferring friendship network structure by using mobile phone data”. PNAS vol. 106, no. 36, pp. 15274-15278, 2009. |
[4] | R. Brause, T. Langsdorf, M. Hepp,”Neural data mining for credit card fraud detection”. Tools with Artificial Intelligence, 11th IEEE International Conference, pp. 103 – 106, 1999. |
[5] | Jen Ye Goh, David Taniar, “Mobile Data Mining by Location Dependencies”. Intelligent Data Engineering and Automated Learning – IDEAL Lecture Notes in Computer Science,vol. 3177, pp. 225-231, 2004. |
[6] | J. Han, R. B. Altman, V. Kumar, H. Mannila, D. Pregibon, “Emerging scientific applications in data mining”. Communications of the ACM, vol. 45, pp. 54-58, 2002. |
[7] | D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, G. J. Minden, “A survey of active network research. Communications Magazine”. IEEE, vol. 35, pp. 80-86, 1997. |
[8] | G. Bontempi, Y. Le Borgne, “An adaptive modular approach to the mining of sensor network data”. In Proceedings of 1st International Workshop on Data Mining in Sensor Networks as part of the SIAM International Conference on Data Mining, pp. 3-9, 2005. |
[9] | V. S. Tseng, K. W. Lin, “Efficient mining and prediction of user behavior patterns in mobile web systems”. Information and software technology, vol. 48, pp. 357-369, 2006. |
[10] | J. Peppard, A. Rylander, “From Value Chain to Value Network:: Insights for Mobile Operators”. European Management Journal, vol. 24, pp. 128-141, 2006. |
[11] | M. J. Berry, G. S Linoff, “Data mining techniques: for marketing, sales, and customer relationship management”. Wiley Computer Publishing, 2004. |
[12] | Q. Yang, X. Wu, “10 challenging problems in data mining research”. International Journal of Information Technology & Decision Making, vol. 5, pp. 597-604, 2006. |
[13] | M. Goebel, L. Gruenwald, “A survey of data mining and knowledge discovery software tools”. ACM SIGKDD Explorations Newsletter, vol. 11, pp. 20-33, 1999. |
[14] | V. S. Tseng, K. W. Lin, “Efficient mining and prediction of user behavior patterns in mobile web systems”. Information and software technology, vol. 48, pp. 357-369, 2006. |
[15] | S. M. Tseng, C. F. Tsui, “Mining multilevel and location-aware service patterns in mobile web environments”. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 34, pp. 2480-2485, 2004. |
[16] | G. Yavas, D. Katsaros, Ö. Ulusoy, Y. Manolopoulos, “A data mining approach for location prediction in mobile environments”. Data & Knowledge Engineering, vol. 54, pp. 121-146, 2005. |
[17] | C. P. Wei, I. Chiu, “Turning telecommunications call details to churn prediction: a data mining approach”. Expert systems with applications, vol. 23, pp. 103-112, 2002. |
[18] | J. L. Chen, “Resource allocation for cellular data services using multiagent schemes”. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 31, pp. 864-869, 2001. |
[19] | A. J. Lee, Y. T. Wang,”Efficient data mining for calling path patterns in GSM networks”. Information Systems, vol. 28, pp. 929-948, 2003. |
[20] | J. Laiho, K. Raivio, P. Lehtimaki, K. Hatonen, O. Simula, “Advanced analysis methods for 3G cellular networks”. Wireless Communications, IEEE Transactions on, vol. 4, pp. 930-942, 2005. |