Skip to main content
Log in

A novel handover detection model via frequent trajectory patterns mining

  • Original Article
  • Published:
International Journal of Machine Learning and Cybernetics Aims and scope Submit manuscript

Abstract

As the cellular wireless communication techniques grow rapidly, the cells become smaller than the traditional communication system, then the handover events are very frequent and need to support a large number of users, and handover detection has become a very active research direction in a mobile computing environment. In order to copy with the problem of frequent handover operations between base stations in current cellular communication networks as cybernetic systems, we propose a novel handover detection approach by integrating frequent trajectory patterns mining and location prediction techniques. The proposed model contains the following essential steps: (1) mining frequent trajectory patterns from large-scale historical trajectory databases by applying an improved Apriori-like rule-based machine learning algorithm, which finds the intersection of candidate items by applying the trajectory connection operation instead of calculating the support count of each trajectory patterns and the candidate items are considerably reduced; (2) discovering movement rules based on the frequent trajectory pattern set by finding the postfix items of given prefix items satisfying the minimum support threshold; (3) inferring the future locations of moving objects by applying the movement rules matching strategy; (4) determining whether or not to perform handover detection across base stations in a cellular network beyond the discovered prediction results, according to the coverage area of cellular networks. Extensive experiments were conducted on the mobile datasets and the experimental results demonstrate the advantages of the proposed algorithm from the following four aspects: (1) the accuracy of handover detection is above 95% at average which is a very satisfactory result in a mobile computing environment; (2) the time cost is less than 20 s when the number of movement rules and handover detection is 1000, which further shows the merit of the runtime performance of the proposed method; (3) the frequent-trajectory-patterns based handover detection algorithm can successfully avoid the ping-pong effect due to unnecessary handover operations; (4) and lastly significantly reduce the error rate of frequent handover decisions and the average unnecessary handover rate is lower than 0.05 when compared with the state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Cui L, Yang S, Chen F, Ming Z, Nan L, Qin J (2018) A survey on application of machine learning for internet of things. Int J Mach Learn Cybern 9(8):1399–1417

    Google Scholar 

  2. Feng T, Huang K, Tian-shun X (2013) Communication situation estimating method based on hmm. Comput Eng 39(2):6–11

    Google Scholar 

  3. Wen N, Xiaohong S, Ma P, Zhao L, Zhang Y (2017) Online uav path planning in uncertain and hostile environments. Int J Mach Learn Cybern 8(2):469–487

    Google Scholar 

  4. Qiao S, Han N, Zhou J, Li R-H, Jin C, Gutierrez LA (2018) SocialMix: a familiarity-based and preference-aware location suggestion approach. Eng Appl Artif Intell 68:192–204

    Google Scholar 

  5. Chen J, Mao G, Li C, Zhang D (2020) A topological approach to secure message dissemination in vehicular networks. IEEE Trans Intell Transp Syst 21(1):135–148

    Google Scholar 

  6. Zhang D, Zhang T, Liu X (2018) Novel self-adaptive routing service algorithm for application in VANET. Appl Intell 49(1):1866–1879

    MathSciNet  Google Scholar 

  7. Zhang D, Zhang T, Dong Y, Liu X, Cui Y, Zhao D (2018) Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning. J Netw Comput Appl 122:37–49

    Google Scholar 

  8. Liu S, Zhang D, Liu X, Zhang T, Gao J, Gong C, Cui Y (2019) Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access 7:21343–21358

    Google Scholar 

  9. Zhang D, Gao J, Liu X, Zhang T, Zhao D (2019) Novel approach of distributed & adaptive trust metrics for MANET. Wireless Netw 25(6):3587–3603

    Google Scholar 

  10. Liu S, Zhang D, Liu X, Zhang T, Hao W (2020) Adaptive repair algorithm for tora routing protocol based on flood control strategy. Comput Commun 151:437–448

    Google Scholar 

  11. Zhang D, Liu X, Cui Y, Chen L, Zhang T (2019) A kind of novel RSAR protocol for mobile vehicular ad hoc network. CCF Trans Netw 2:111–125

    Google Scholar 

  12. Zhang D, Hao W, Zhao P, Liu X, Cui Y, Chen L, Zhang T (2020) New approach of multi-path reliable transmission for marginal wireless sensor network. Wireless Netw 26(2):1503–1517

    Google Scholar 

  13. Zhang D, Li G, Zheng K, Ming X, Pan ZH (2014) An energy-balanced routing method based on forward-aware factor for wireless sensor networks. IEEE Trans Ind Inf 10(1):766–773

    Google Scholar 

  14. Zhang D, Liu S, Zhang T, Liang Z (2017) Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education. J Netw Comput Appl 88:1–9

    Google Scholar 

  15. Zhang T, Zhang D, Qiu J, Zhang X, Zhao P, Gong C (2019) A kind of novel method of power allocation with limited cross-tier interference for CRN. IEEE Access 7:82571–82583

    Google Scholar 

  16. Zhang D, Wang X, Song X, Zhao D (2014) A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Trans Serv Comput 7(4):741–748

    Google Scholar 

  17. Zhang D, Zheng K, Zhang T, Wang X (2015) A novel multicast routing method with minimum transmission for WSN of cloud computing service. Soft Comput 19(7):1817–1827

    Google Scholar 

  18. Zhang D, Zhao P-Z, Yu-ya Cui L, Chen TZ, Hao W (2019) A new method of mobile ad hoc network routing based on greed forwarding improvement strategy. IEEE Access 7:158514–158524

    Google Scholar 

  19. Zhang D (2012) A new approach and system for attentive mobile learning based on seamless migration. Appl Intell 36(1):75–89

    Google Scholar 

  20. Qiao S, Tang C, Jin H, Long T, Dai S, Yungchang K, Chau M (2010) PutMode: prediction of uncertain trajectories in moving objects databases. Appl Intell 33(3):370–386

    Google Scholar 

  21. Qiao S, Shen D, Wang X, Han N, Zhu W (2015) A self-adaptive parameter selection trajectory prediction approach via hidden Markov models. IEEE Trans Intell Transp Syst 16(1):284–296

    Google Scholar 

  22. Qiao S, Han N, Zhu W, Gutierrez LA (2015) TraPlan: an effective three-in-one trajectory-prediction model in transportation networks. IEEE Trans Intell Transp Syst 16(3):1188–1198

    Google Scholar 

  23. Chen J, Meng X, Guo Y, Grumbach S, Sun H (2006) Modeling and predicting future trajectories of moving objects in a constrained network. In: Proceedings of the 7th international conference on mobile data management, IEEE, pp 156–156

  24. Zhang D, Niu H, Liu S (2017) Novel PEECR-based clustering routing approach. Soft Comput 21(24):7313–7323

    Google Scholar 

  25. Zhang D, Zhang T, Zhang J, Dong Y, Zhang X (2018) A kind of effective data aggregating method based on compressive sensing for wireless sensor network. EURASIP J Wireless Commun Netw 2018(159):1–15

    Google Scholar 

  26. Zhang D, Zhou S, Tang Y (2018) A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy. MONET 23(4):828–839

    Google Scholar 

  27. Zhang D, Chen C, Cui YY, Zhang T (2018) New method of energy efficient subcarrier allocation based on evolutionary game theory. Mobile Netw Appl 2018(9):1–14

    Google Scholar 

  28. Zhang D, Zhang X (2012) Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application. Enterprise Inf Syst 6(4):473–489

    Google Scholar 

  29. Zhang D, Zhu Y, Zhao C, Dai W (2012) A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the internet of things (IOT). Comput Math Appl 64(5):1044–1055

    MATH  Google Scholar 

  30. Zhang D, le Gong C, Jiang K (2019) A kind of new method of intelligent trust engineering metrics (ITEM) for application of mobile ad hoc network. Eng Comput 11:1–13

    Google Scholar 

  31. Matthew KXJP, Skjervøy V, Chan WP, Inaba M, Croft EA (2017) Automated detection of handovers using kinematic features. Int J Robot Res 36(5–7):721–738

    Google Scholar 

  32. Malathy EM, Muthuswamy V (2018) State of art: vertical handover decision schemes in next-generation wireless network. J Commun Inf Netw 3(1):43–52

    Google Scholar 

  33. Wang X-Z, Wang R, Chen X (2018) Discovering the relationship between generalization and uncertainty by incorporating complexity of classification. IEEE Trans Cybern 48(2):703–715

    Google Scholar 

  34. Wang X, Xing H-J, Li Y, Hua Q, Dong C-R, Pedrycz W (2015) A study on relationship between generalization abilities and fuzziness of base classifiers in ensemble learning. IEEE Trans Fuzzy Syst 23(5):1638–1654

    Google Scholar 

  35. Wang X-Z, Zhang T, Wang R (2019) Noniterative deep learning: Incorporating restricted boltzmann machine into multilayer random weight neural networks. IEEE Trans Syst Man Cybern Syst 49(7):1299–1308

    Google Scholar 

  36. Zhang D, Niu H, Liu S, Ming X (2017) Novel positioning service computing method for WSN. Wireless Personal Commun 92(4):1747–1769

    Google Scholar 

  37. Liu X, Zhang D, Yan H-R, Cui Y, Chen L (2019) A new algorithm of the best path selection based on machine learning. IEEE Access 7:126913–126928

    Google Scholar 

  38. Zhang D, Tang YM, Cui YY, Gao JX, Liu XH, Zhang T (2019) Novel reliable routing method for engineering of internet of vehicles based on graph theory. Eng Comput 36(1):226–247

    Google Scholar 

  39. Zhang D, Ge H, Zhang T, Cui Y, Liu X, Mao G (2019) New multi-hop clustering algorithm for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(4):1517–1530

    Google Scholar 

  40. Zhang D, Zheng K, Zhao D, Song X, Wang X (2016) Novel quick start (QS) method for optimization of TCP. Wireless Netw 22(1):211–222

    Google Scholar 

  41. Qiao S, Jin K, Han N, Tang C, Gesangduoji, Gutierrez LA (2015) Trajectory prediction algorithm based on Gaussian mixture model. J Softw 26(5):1048–1063

    MathSciNet  Google Scholar 

  42. Qiao S, Han N, Gao Y, Li R-H, Huang J, Guo J, Gutierrez LA, Xindong W (2018) A fast parallel community discovery model on complex networks through approximate optimization. IEEE Trans Knowl Data Eng 30(9):1638–1651

    Google Scholar 

  43. Ding Z, Yang B, Güting RH, Li Y (2015) Network-matched trajectory-based moving-object database: models and applications. IEEE Trans Intell Transp Syst 16(4):1918–1928

    Google Scholar 

  44. Dai J, Yang B, Guo C, Ding Z (2015) Personalized route recommendation using big trajectory data. In: Proceedings of the 31st IEEE international conference on data engineering, IEEE, pp 543–554

  45. Yuan G, Zhao J, Xia S, Zhang Y, Li W (2017) Multi-granularity periodic activity discovery for moving objects. Int J Geogr Inf Sci 31(3):435–462

    Google Scholar 

  46. Yuening H, Kang C, Tang J, Yin D, Chang Y (2017) Large-scale location prediction for web pages. IEEE Trans Knowl Data Eng 29(9):1902–1915

    Google Scholar 

  47. Qiao Y, Cheng Y, Yang J, Liu J, Kato N (2017) A mobility analytical framework for big mobile data in densely populated area. IEEE Trans Vehic Technol 66(2):1443–1455

    Google Scholar 

  48. Huang Q, Li Z, Li J, Chang C (2016) Mining frequent trajectory patterns from online footprints. In: Proceedings of the 7th ACM SIGSPATIAL international workshop on geostreaming, ACM, pp Article No. 10

  49. Solmaz G, Turgut D (2017) Modeling pedestrian mobility in disaster areas. Pervasive Mobile Comput 40:104–122

    Google Scholar 

  50. Kashmar N, Atieh M (2018) Mining frequent patterns to identify vertical handover parameters in cellular networks. J Ambient Intell Human Comput 9(1):31–42

    Google Scholar 

  51. Alhabo M, Zhang L (2017) Unnecessary handover minimization in two-tier heterogeneous networks. In: Proceedings of the 13th annual conference on wireless on-demand network systems and services, IEEE, pp 160–164

  52. El Fachtali I, Saadane R, El Koutbi M (2017) Improved vertical handover decision algorithm using ants’ colonies with adaptive pheromone evaporation rate for 4th generation heterogeneous wireless networks. Int J Wireless Mobile Comput 12(2):154–165

    Google Scholar 

  53. Thumthawatworn T, Tillapart P, Santiprabhob P (2017) Adaptive multi-fuzzy engines for handover decision in heterogeneous wireless networks. Wireless Personal Commun 93(4):1005–1026

    Google Scholar 

  54. Naeem B, Ngah R, Hashim SZM (2018) Reduction in ping-pong effect in heterogeneous networks using fuzzy logic. Soft Comput 23(1):269–283

    Google Scholar 

  55. Tartarini L, Marotta MA, Cerqueira E, Rochol J, Both CB, Gerla M, Bellavista P (2018) Software-defined handover decision engine for heterogeneous cloud radio access networks. Comput Commun 115:21–34

    Google Scholar 

  56. Almutairi AF, Hamed M, Landolsi MA, Al-Gharabally M (2018) A genetic algorithm approach for multi-attribute vertical handover decision making in wireless networks. Telecommun Syst 68(2):151–161

    Google Scholar 

  57. Gordon L (2017) Stüber, principles of mobile communication. Springer, Berlin

    Google Scholar 

  58. Li Y, Zhang Z-H, Chen W-B, Min F (2017) Tdup: an approach to incremental mining of frequent itemsets with three-way-decision pattern updating. Int J Mach Learn Cybern 8(2):441–453

    Google Scholar 

  59. Anand HS, Vinodchandra SS (2018) Association rule mining using treap. Int J Mach Learn Cybern 9(4):589–597

    Google Scholar 

  60. Qiao S, Han N, Wang J, Li R-H, Gutierrez LA, Xindong W (2018) Predicting long-term trajectories of connected vehicles via the prefix-projection technique. IEEE Trans Intell Transp Syst 19(7):2305–2315

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China under Grant Nos. 61772091, 61802035, 61962006, 71701026; the Sichuan Science and Technology Program under Grant Nos. 2018JY0448, 2019YFG0106, 2019YFS0067; the Natural Science Foundation of Guangxi under Grant No. 2018GXNSFDA138005; Guangdong Province Key Laboratory of Popular High Performance Computers under Grant No. 2017B030314073; the Innovative Research Team Construction Plan in Universities of Sichuan Province under Grant No. 18TD0027; the Key R&D Program of Guangdong province under Grant No. 2018B030325002.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaojie Qiao.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, N., Qiao, S., Yuan, G. et al. A novel handover detection model via frequent trajectory patterns mining. Int. J. Mach. Learn. & Cyber. 11, 2587–2606 (2020). https://doi.org/10.1007/s13042-020-01126-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13042-020-01126-2

Keywords

Navigation