簡易檢索 / 詳目顯示

研究生: 曾于誠
YU-CHENG ZENG
論文名稱: 使用預測式分析之行動管理
Location Management Using Predictive Analysis
指導教授: 馮輝文
Huei-Wen Ferng
口試委員: 吳榮根
none
張宏慶
none
洪西進
none
黎明富
none
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 43
中文關鍵詞: 位置管理個人通訊服務蜂巢式網路資料探勘位置更新角度式傳呼
外文關鍵詞: Location Management, Personal Communication Service, Cellular Network, Data Mining, Location Update, Angular Paging
相關次數: 點閱:526下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 行動管理機制是在個人通訊服務 (Personal Communication Service)是其中一個重大的議題。在本論文中,我們提出一個新穎的演算法,它可以預測行動用戶的路徑型樣。所以我們希望可以藉由預測行動用戶的軌跡有效降低位置管理成本。因此我們提出一個機制,可由手機離線的歷史移動軌跡來找出手機的移動型樣。此外,這行動管理機制使用距離為基礎以及各式角度傳呼。最後,模擬的結果顯示我們所提出的機制在各種移動速度下,能夠有效的降低個人通訊服務之位置管理成本。


    Location management scheme is one of the most essential issues in personal communication service (PCS) network. In this thesis,we propose a novel data mining algorithm which can predict path pattern of a mobile user. Hence,we try to effectively reduce ralated location manamgement costs by predicting trajectory of mobile user. Therefore,we propose a scheme,user mobility patterns are mined from the history of offline Mobile Terminal trajectories. Additionally,a scheme of location anageent base on distance-base scheme and various kind of angular paging. Finally,simulation results compared with different velocities show that can effectively reduce costs of location management in PCS.

    中文摘要 i 英文摘要 ii 目錄 iii 表格目錄 v 圖形目錄 vi 第一章 緒論 ............................. 1 第二章 相關研究 ............................. 6 2.1行動管理相關領域 ............................. 6 2.2資料探勘相關領域 ............................. 7 第三章 結合方向距離之可調整角度行動管理機制 .............................10 3.1 Novel Distance-base之偵測移動模型機制 ................ 10 3.2 NEW Angular And Distance Base(NAADB)之位置更新機制 ..... 15 3.3 NEW Angular And Distance Base(NAADB)之傳呼機制 ........ 17 第四章 時間複雜度和空間複雜度分析 ............................. 20 4.1時間複雜度和空間複雜度分析 ....................... 20 第五章 模擬數值結果與討論 ............................. 24 5.1移動模型與模擬環境 ............................ 24 5.2模擬數值討論 ............................... 24 第六章 總結 ............................. 37 參考文獻 ............................. 38 誌謝 ............................. 43

    [1] Cheng-Ming Huang, Tzung-Pei Hong, Shi-Jinn Horng, “Discovering mobile users moving behaviors in wireless networks,” Expert Systems with Applications, Volume 36, Issue 8, October 2009 , Pages 10809-10814, .

    [2] M. Daoui, A. M zoughi, M. Lalam, M. Belkadi, R. Aoudjit, “Mobility prediction based on an ant system,” Computer Communications, Volume 31, Issue 14, 5 September 2008, Pages 3090-3097, .

    [3] I.Z. Koukousidis, P.P. Demestichas, P.I. Papaioannou and M.E. Theologou, “Optimal decision strategies for paging in mobile cellular networks,” Wirel. Commun. Mobile Comput., 2007, Pages 399 413, .

    [4] HyeJeong Lee, Dong-Ho Cho, “An efficient location management scheme based on replication strategy for intersystem roaming in mobile wireless networks,” Computer Communications, Volume 29, Issue 16, 12 October 2006, Pages 3238-3249, .

    [5] Alice Este, Francesco Gringoli, Luca Salgarelli, “Support Vector Machines for TCP traffic classification,” Computer Networks, Volume 53, Issue 14, 18 September 2009, Pages 2476-2490, .

    [6] Hong-Zhi Lin, Hing-Po Lo, Xiao-Jian Chen, “Lifestyle classifications with and without activity-travel patterns,” Transportation Research Part A: Policy and Practice, Volume 43, Issue 6, July 2009, Pages 626-638, .

    [7] Shun-Ren Yang, Yung-Chun Lin and Yi-Bing Lin, “Performance of mobile telecommunications network with overlapping location area configuration,” IEEE, December 1, 2006, .

    [8] Jun Zheng, Yan Zhang, Ling Wang, Jinlin Chen, “Adaptive location update area design for wireless cellular networks under 2D Markov walk model,” in Computer Communications , Volume 30, Issue 9, 30 June 2007, Pages 2060-2069

    [9] Gokhan Yavas, Dimitrios Katsaros, Ozgur Ulusoy, Yannis Manolopoulos, “A data mining approach for location prediction in mobile environments,” in Data Knowledge Engineering , Volume 54, Issue 2, August 2005, Pages 121-146

    [10] Li Feng, Qinglin Zhao, Hanwen Zhang, “Location management based on distance and direction for PCS networks,” in Computer Networks , Volume 51, Issue 1, 17 January 2007, Pages 134-152

    [11] Anthony J.T. Lee, Chun-Sheng Wang, Wan-Yu Weng, Yi-An Chen, Huei-Wen Wu, “An efficient algorithm for mining closed inter-transaction itemsets,” in Data Knowledge Engineering , Volume 66, Issue 1, July 2008, Pages 68-91

    [12] Ya-Han Hu, Tony Cheng-Kui Huang, Hui-Ru Yang, Yen-Liang Chen, “On mining multi-time-interval sequential patterns,” in Data Knowledge Engineering , Volume 68, Issue 10, October 2009, Pages 1112-1127

    [13] R.J. Kuo, C.M. Chao, C.Y. Liu, “Integration of K-means algorithm and AprioriSome algorithm for fuzzy sequential pattern mining,” in Applied Soft Computing , Volume 9, Issue 1, January 2009, Pages 85-93

    [14] Ning Chai, Boon Sain Yeo, Yong Huat Chew, “Location management for GPRS,” in Computer Networks , Volume 50, Issue 15, 18 October 2006, Pages 2888-2901

    [15] Dimitrios D. Vergados, Alexandros Panoutsakopoulos, Christos Douligeris, “Group registration with distributed databases for location tracking in 3G wireless networks,” in Computer Networks , Volume 52, Issue 8, 12 June 2008, Pages 1521-1544

    [16] Sonia M. Almeida-Luz, Miguel A. Vega-Rodriguez, Juan A. Gomez-Pulido, Juan M. Sanchez-Perez, “Differential evolution for solving the mobile location management,” in Applied Soft Computing , Volume 11, Issue 1, January 2011, Pages 410-427

    [17] Tzung-Pei Hong, Cheng-Ming Huang, Shi-Jinn Horng, “Discovering fuzzy personal moving profiles in wireless networks,” in Applied Soft Computing , Volume 9, Issue 2, March 2009, Pages 667-676

    [18] Cristian Aflori, Mitica Craus, “Grid implementation of the Apriori algorithm,” in Advances in Engineering Software , Volume 38, Issue 5, May 2007, Pages 295-300

    [19] Wen Zhang, Taketoshi Yoshida, Xijin Tang, “A comparative study of TF*IDF, LSI and multi-words for text classification,” in Expert Systems with Applications , Volume 38, Issue 3, March 2011, Pages 2758-2765

    [20] Jiang Wu, Bin Hu, Jinlong Zhang, Da Fang, “Multi-agent simulation of group behavior in E-Government policy decision,” in Simulation Modelling Practice and Theory , Volume 16, Issue 10, November 2008, Pages 1571-1587

    [21] Sk. Morshed Anwar, Cedric A. Jeanneret, Lael Parrott, Danielle J. Marceau, “Conceptualization and implementation of a multi-agent model to simulate whale-watching tours in the St.Lawrence Estuary in Quebec, Canada,” in Environmental Modelling Software , Volume 22, Issue 12, December 2007, Pages 1775-1787

    [22] J. Zhang, “A cell ID assignment scheme and its applications,” in Proc. IEEE ICPPW ’00, pp. 507–512, Aug. 2000.

    [23] Jong Soo Park , Ming-Syan Chen , Yu, P.S., “Using a Hash-Based Method with Transaction Trimming and Database Scan Reduction for Mining Association Rules,” IEEE Knowledge and Data Engineering , Volume 9, Issue 5, Aug 1997, Page 813-825

    [24] Zheng, J. , Regentova, E., “EDBLU: enhanced direction-based location update scheme for PCS networks,” Electronics Letters , Volume 40, Issue 15, July 2004, Page 946 -947

    QR CODE