Multichannel Allocation in Data Schemes using Data Mining(DMM) based Methodology for Multi Moving Nodes in Adhoc Computing System

نویسندگان

  • N. Rajkumar
  • P. Subha
  • R. Kavitha
  • N. K. Senthil KUmar
چکیده

In this paper, we present a new data mining algorithm which involves Data mining for multi moving nodes in a adhoc computing environment and quest the mining results to develop multichannel data allocation schemes so as to improve the overall performance of a adhoc system. First, we propose an algorithm to capture the frequent multichannel user moving nodes from a set of log data in a mobile(adhoc) environment. The algorithm proposed is enhanced with the Data mining capability and is able to discover new moving nodes efficiently without compromising the quality of results and enhanced output obtained. Mining results of node moving patterns and the properties of data objects & data set in data mining, we develop multichannel data allocation schemes that can utilize the knowledge of mobile nodes in adhoc pattern for proper allocation of both personal and shared data. By employing the data allocation schemes, the occurrences of cost for remote access scan be minimized and the performance of a mobile adhoc system is thus improved. For personal data allocation(Individual channel), two data allocation schemes, which explore different levels of mining results, are devised: one utilizes the set level of mobile nodes(moving patterns) and the other utilizes the path level of mobile nodes(i.e., OSPFrouting(moving patterns) Performance of these data allocation schemes is comparatively analysed. It is shown by our simulation results that the knowledge obtained from the mobile nodes is very important in devising effective in multichannel data allocation schemes which can lead to significant performance improvement in a mobile adhoc system(mobile computing). KeywordsData mining, mobile computing, user moving patterns, data allocation scheme, mobile database,adhoc

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mining User Moving Patterns for Personal Data Allocation in a Mobile Computing System

In this paper: we devise a new data mining algorithm which involves mining for user moving patterns in a mobile computing environment, and utilize the mining results to develop data allocation schemes so as to improve the overall performance of a mobile system. First, we devise an algorithm to capture the fiequent user moving patterns fiom a set of log data in a mobile environment. Then, in lig...

متن کامل

Combining data envelopment analysis and multi-objective model for the efficient facility location–allocation decision

This paper proposes an innovative procedure of finding efficient facility location–allocation (FLA) schemes, integrating data envelopment analysis (DEA) and a multi-objective programming (MOP) model methodology. FLA decisions provide a basic foundation for designing efficient supply chain network in many practical applications. The procedure proposed in this paper would be applied to the FLA pr...

متن کامل

Developing Data Allocation Schemes by Incremental Mining of User Moving Patterns in a Mobile Computing System

In this paper, we present a new data mining algorithm which involves incremental mining for user moving patterns in a mobile computing environment and exploit the mining results to develop data allocation schemes so as to improve the overall performance of a mobile system. First, we propose an algorithm to capture the frequent user moving patterns from a set of log data in a mobile environment....

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Capacitated Single Allocation P-Hub Covering Problem in Multi-modal Network Using Tabu Search

The goals of hub location problems are finding the location of hub facilities and determining the allocation of non-hub nodes to these located hubs. In this work, we discuss the multi-modal single allocation capacitated p-hub covering problem over fully interconnected hub networks. Therefore, we provide a formulation to this end. The purpose of our model is to find the location of hubs and the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013