Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment

  • Mohbey, Krishna K. (Maulana Azad National Institute of Technology Bhopal) ;
  • Thakur, G.S. (Maulana Azad National Institute of Technology Bhopal)
  • Received : 2013.09.17
  • Accepted : 2014.04.29
  • Published : 2014.06.30


Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.



Mobile devices are very popular for communication and accessing mobile services. Mobile services can be accessed anywhere via information service oviders (Chen et al., 2012). By the development of wireless communication techniques and high feature mobile devices, mobile commerce has become easier and fast. Today most of the mobile devices have high features and support for internet and web services (Kiukkonen et al., 2010). These devices are capable of sending requests for some transactions and services (Perez et al., 2010; Gao et al., 2013). They are also capable of transferring information between multiple users. Services may include selling, purchasing, online information accessing, or using social networking sites, etc. These various kinds of services are accessed by mobile devices and accessed information is stored in the transaction log files (Kiukkonen et al., 2010). Transactions mainly store user information, location information, and time information during which the user accesses any service, and finally the details of services are stored. For fast response from the system for any requested service, data mining operations can be applied to this stored information. These operations may be the mining of similar kinds of services, finding similar habits of users, and preparing groups according to services, etc. By applying such kinds of data mining operations we can restructure the web service environment and take advantage of providing recommendations and predictions for interested users. These are also helpful for business peoples for enhancing their business strategies in web environments.


Fig. 1 Different users movement in various locations

Traditional mobile services are inadequate in handling user movement pattern analysis without the use of location, time of the service, and service request details (Lee, 2007). Over the past years some studies have employed various data mining techniques to provide interesting patterns in mobile service environments (Liu & Keselj, 2007; Pabarskaite & Raudys, 2007). Association rules are used to find unknown frequent patterns between parameters (Agrawal & Srikant, 1994). Apriori is the pioneer for mining frequent itemsets from transaction databases. FPGrowth, which is based on a pattern growth method was afterward proposed to achieve a better performance than Apriori-based methods. FP-Growth improves efficiency of frequent items because it only scans databases twice. Some studies have also focused on the uses of large databases (Cheng et al., 2004). Some recent studies are going to mine the moving path on service request log mines (Agrawal & Srikant, 1994). Researchers have also studied the problem of location tracking (Yavas et al., 2005; Tsai et al., 2007; Tseng & Lu, 2009) and resource allocation (Huang & Lin, 2008; Huang et al., 2003; Peng & Chen, 2005; Peng & Chen, 2003). Bipartite graph matching is also used to find mobile user movement behavior (Ilyas et al., 2004; Fayyazi et al., 2004; Monnot & Toulouse, 2007). Currently, different approaches are in progress to find interesting patterns of mobile users (Lee et al., 2007; Lancieri & Durand, 2006; Tseng et al., 2007; Terziyan & Vitko, 2003; Huang et al., 2003). In mobile e-commerce environments interesting user behaviors can also be predicted, based on accessed services sequences. In this paper, we analyze the behavior of the mobile user movement and find the interesting patterns. Here we have used an associated tree method for joining multiple parameters of mobile access environments. These generated patterns are helpful to business people for launching new services and for providing quick responses to existing ones. Figure 1 shows the simple scenario in which different locations are randomly visited by users. Here \({l_1,l_2,l_3\dots l_n}\) shows the different locations and \({u_1,u_2,u_3\dots u_n}\) represents different mobile users. In this proposed associated tree based pattern mining approach we have used a predefined minimum support value using those interesting patterns which are extracted from the generated candidate records. An associated tree based record represents the relationship between four predefined parameters, and its numeric value represents the degree of matching relation of a particular record.

In this paper mobile users, visited locations, dwell time, and services are used to construct the associated tree. Associated trees are used to find the frequent patterns. A Maxflow database is used to represent the relation between these four parameters and joining operations performed between them. This proposed approach is compared with the Apriori candidate generation algorithm. The remainder of this paper is organized as follows. Section 2 defines the basics of the user movement on different locations. Section 3 shows the proposed approach for mobile user behavior analysis by joining associated trees. The experiments conducted and results obtained are explained in section 4. Finally the conclusion is presented in section 5.



Mobile e-commerce is an emerging field for recommendation and user behavior analysis. For predicting mobile user behavior, data mining techniques are used. Various parameters are responsible for user behavior prediction. The main parameters are user, visited locations, timestamp, and services (Chen et al., 2012; Mohbey & Thakur, 2013). By these parameters, we can mine various patterns for users. According to these generated patterns, prediction and recommendations are easier. In this paper, we have generated patterns using an associated tree method and the above discussed parameters. Based on generated patterns business people are entitled to launch new services, design appropriate strategies, and so on. The following terminologies are used in this paper.

Definition 1 (Mobile User). \({U= \left\{ u_1,u_2,u_3\dots u_n \right\}}\)is the set of mobile users. Each mobile user represents a physical person who carries a mobile device that has the capability of receiving services from the mobile environment (Chen et al., 2012; Mohbey & Thakur, 2013).

Definition 2 (Visited Location). \({L= \left\{ l_1,l_2,l_3\dots l_n \right\}}\)is the set of locations at which users visit and stay for some time (Mohbey & Thakur 2013).

Definition 3 (Timestamp). \({T= \left\{ t_1,t_2,t_3\dots t_n \right\}}\) is the set of time durations where mobile users spend time for using requested services. The timestamp Tn, as defined in Table 2, is assumed to have an equal period and a uniform unit. The maximum duration is considered 30 minutes in general (Chen et al., 2012).

Definition 4 (Mobile Services). \({S= \left\{ s_1,s_2,s_3\dots s_n \right\}}\)is the set of mobile services requested by the mobile users.

Definition 5 (Support of a Relation). The support of a relation r, such as user→location, user→time, user→service, location→time etc, is denoted as sup(r) and defined as the number of tuples that contain r in the maxflow database. For example in Table 3, the support of the relation \({u_1}\)\({l_1}\) is 3.

Definition 6 (Matching Join). If M⊆U⋈L⋈T⋈S. this M is a match join of U,L,T,S (Chen et al., 2012; Mohbey & Thakur, 2013).

Table 1 shows the mobile user movement database in which (\({1_i}\),Time); \({1_i}\) identifies the Location and Time in HH:MM:SS format. This table is derived from Figure.1. Here 3 users visited different locations at different times.

Table 1. Database for Mobile User Movement


Table 2 shows the predefined timeslots. Maximum  duration taken is 30 minutes. According to this, we  divide a whole day into 48 time slots of 30 minutes each. These time slots are identified as \({T_1,T_2,T_3\dots T_{48}.}\) Each time slot indicates a particular time when a particular user accesses a service from some location.

Table 2. Predefine Time Slots for a day


Table 3 shows the maxflow database in which each record represents the user-location-time-service relation. This relation is used to prepare frequent n-trees.



Associated trees are used to extract the interesting frequent patterns from the various relationships of the user-location-time-service values. Frequent tree patterns are extracted by applying loops. Then we get n-tree candidate patterns. To find the interesting frequent patterns, we firstly scan the maxflow database and generate frequent 1-tree candidate patterns. If the extracted candidate pattern is less than the predefined minimum support value then this pattern is pruned. 

Now, a matching join operation is applied to generate a frequent 2-tree pattern. Again if the extracted candidate pattern support is less than the predefined minimum support then infrequent patterns are pruned. Similarly we extract the 3-tree candidate pattern and then the n+1 tree candidate frequent pattern. This process continues until the tree is empty or no more candidates are generated.

After getting each n-tree candidate frequent pattern set we prepare a associated sub tree of the relation record and count the nodes on it. Here maximum node count of a sub tree represents the strong frequent tree pattern. Algorithm 1 show the complete process of frequent associated tree pattern mining (Chen et al., 2012).


Algorithm 1. Algorithm to find frequent associated tree patterns.

  1.          Frequent n-Tree candidate patterns denoted as Cn m, m=4. 
  2.          Maximum and minimum count of nodes denoted as Max and Min respectively.
  3.          Sum of nodes denoted as SN.
  4.          For (a=0 to 4) do                        // 1-tree candidate patterns
  5.          generate \({C{_1}^{4}}\) and \({L_1}\)
  6.          End For
  7.          SN=0;
  8.          For (a=0 to 4) do         // 2-tree candidate patterns
  9.                     Node= generate \({C{_2}^{4}}\) and \({L_2}\) by matching join to  \({C{_1}^{4}}\) and \({L_1}\)
  10.                     If a=0 then
  11.                                     Max =Node; Min=Node;
  12.                     Else
  13.                                     If (Node > Max) then
  14.                                     Max=Node;
  15.                                     Else if (Node < Min) then
  16.                                     Min=Node;
  17.                                     End IF
  18.                     End If
  19.          SN+=Node;
  20.          End For
  21.          SN=0;
  22.          For (a=0 to 4) do         //3-tree candidate patterns
  23.                     Node=generate \({C{_3}^{4}}\) and \({L_3}\) by matching join to \({C{_2}^{4}}\) and \({L_2}\)
  24.                     If a=0 then
  25.                                     Max =Node; Min=Node;
  26.                     Else
  27.                                     If (Node > Max) then
  28.                                     Max=Node;
  29.                                     Else if (Node
  30.                                     Min=Node;
  31.                                     End IF
  32.                     End If
  33.          SN+=Node;
  34.          End For


This whole process of finding frequent candidate patterns is illustrated in the example below.



The complete procedure of associated tree pattern mining is shown here. For this illustration we have taken 15 records in the maxflow database which is shown in table 3. Matching join operation is performed between four parameters to generate candidate sets. These candidate sets are \({C{_1}^{4},C{_2}^{4},C{_3}^{4},C{_4}^{4}\dots C{n}^{m}}\)and frequent item sets are \({L_1,L_2,L_3,L_4, \dots L_n.}\)


4.1. Generating Candidate Set  \({C{_1}^{4}}\)

The proposed approach firstly generates the candidate set \({C{_1}^{4}}\) for user, location, dwell time, and services. These generated candidate sets are shown in Table 4, Table 5, Table 6, and Table 7 respectively.


Table 4. Candidate set for user


Table 5. Candidate set for location


Table 6. Candidate set for dwell time


Table 7. Candidate set for service


4.2. Generating Candidate Set \({C{_2}^{4}}\)

Now we apply a matching join operation between \({C{_1}^{4}}\)and frequent itemset \({L_1}\), then we found candidate set \({C{_2}^{4}}\) and \({L_2}\). These sets are \({U_i}\)\({L_j}\), \({U_i}\)\({T_k}\), \({U_i}\)\({S_m}\), \({L_j}\)\({T_k}\), \({L_j}\)\({S_m}\) and \({T_k}\)\({S_m}\). These matching joins are represented in Table 8 to Table 13 and corresponding frequent 2-tree candidate patterns in Figures 2 to 7 respectively.

Table 8 represents the matching join of Ui⋈Lj. It is prepared by counting the relation of \({U_i}\)\({L_j}\) as 

We prune the relations which have lesser count from the predefined minimum support. In this example we have set minimum count=2; so that the relation \({u_1}\)\({l_1}\), \({u_2}\)\({l_2}\), \({u_3}\)\({l_2}\), \({u_3}\)\({l_4}\) follows the matching join condition. These relations are denoted in Table 8 and the corresponding frequent 2-tree candidate pattern is shown in Figure 2. Associated Trees prepared by various cases of the matching join \({U_i}\)\({L_j}\), are presented in Table 8. By joining all these cases we find the final frequent candidate tree of 13 nodes.

Table 8. Matching joins for \({U_i}\)\({L_j}\),


Fig. 2 Associated tree for \({U_i}\)\({L_j}\) of Table 8 

Similarly, different \({C_{2}^{4}}\)candidate sets are shown in Table 9, Table 10, Table 11, Table 12, and Table 13. Its frequent 2-Tree is shown in Figure 3, Figure 4, Figure 5, Figure 6, and Figure 7 respectively. 

Table 9. Matching joins for \({U_i}\)\({T_k}\)


Fig. 3 Associated tree for \({U_i}\)\({T_k}\) of Table 9


Table 10. Matching joins for \({U_i}\)\({S_m}\)


Fig. 4 Associated tree for \({U_i}\)\({S_m}\) of Table 10


Table 11. Matching joins for \({L_j}\)\({T_k}\)


Fig. 5 Associated tree for \({L_j}\)\({T_k}\) of Table 11


Table 12. Matching joins for \({L_j}\)\({S_m}\)


Fig. 6 Associated tree for \({L_j}\)\({S_m}\) of Table 12


Table 13. Matching joins for \({T_k}\)\({S_n}\)


Fig. 7 Associated tree for \({T_k}\)\({S_m}\) of Table 13


In all candidate sets of \({C_{2}^{4}}\)we have counted nodes by associated tree as
No. of nodes in \({U_i}\)\({L_j}\) = 13
No. of nodes in \({U_i}\)\({T_k}\) = 14
No. of nodes in \({U_i}\)\({S_m}\) = 10
No. of nodes in \({L_j}\)\({T_k}\) = 11
No. of nodes in \({L_j}\)\({S_m}\) = 8
No. of nodes in \({T_k}\)\({S_m}\) = 13

By these matching joins we identified that the relation Ui⋈Tk has the maximum node from all \({C_{2}^{4}}\)candidate sets, which is depicted in Figure 3. Thus it is clear that the relation \({U_i}\)\({T_k}\) is stronger than the other matching relations of the candidate sets of \({C_{2}^{4}}\).


4.3. Generating Candidate Set \({C_{3}^{4}}\)

Now we find the candidate sets of \({C_{3}^{4}}\)and frequent itemset \({L_3}\). These are prepared by the relation \({U_i}\)\({L_j}\)\({T_k}\), \({U_i}\)\({L_j}\)\({S_m}\), \({U_i}\)\({T_k}\)\({S_m}\)and \({L_j}\)\({T_k}\)\({S_m}\).\({C_{3}^{4}}\)candidate sets are illustrated in Tables 14 to 17 and the correspondent associated 3-Tree is shown in Figures 8 to 11 respectively. 

Table 14. Matching joins for \({U_i}\)\({L_j}\)\({T_k}\)


Fig. 8 Associated tree for \({U_i}\)\({L_j}\)\({T_k}\) of Table 14


Table 15. Matching joins for \({U_i}\)\({L_j}\)\({S_m}\)


Fig. 9 Associated tree for \({U_i}\)\({L_j}\)\({S_m}\)of Table 15


Table 16. Matching joins for \({U_i}\)\({T_k}\)\({S_m}\)


Fig. 10 Associated tree for \({U_i}\)\({T_k}\)\({S_m}\) of Table 16


Table 17. Matching joins for \({L_j}\)\({T_k}\)\({S_m}\)


Fig. 11 Associated tree for \({L_j}\)\({T_k}\)\({S_m}\) of Table 17


\({U_i}\)\({L_j}\)\({T_k}\) are constructed by the counting of relations 

In all these counted relations we prune the relations which have less count (<2) from the predefined minimum support so that \({u_1}\)\({l_1}\)\({T_{38}}\)=2 and \({u_3}\)\({l_2}\)\({T_{13}}\)=2 satisfy the minimum support. These relations are denoted in Table 14 with the corresponding frequent 3-Tree in Figure 8. Similarly different \({C_{3}^{4}}\)candidate sets and associated trees are prepared. After preparing all associated sub trees the following nodes are counted:

No. of nodes in \({U_i}\)\({L_j}\)\({T_k}\) =7
No. of nodes in \({U_i}\)\({L_j}\)\({S_m}\)=2

No. of nodes in \({U_i}\)\({T_k}\)\({S_m}\)=9
No. of nodes in \({L_j}\)\({T_k}\)\({S_m}\)=8
It is observed that the relation \({U_i}\)\({T_k}\)\({S_m}\) has the maximum node count, thus this relation is stronger than other relations of the candidate set \({C_{3}^{4}}\).


4.4. Generating Candidate Set \({C_{4}^{4}}\)

In the next step we generate the candidate set \({C_{4}^{4}}\)for relation \({U_i}\)\({L_j}\)\({T_k}\)\({S_m}\). It is shown in Table 18. Here we observed that the count of this relation is less than the predefined minimum support (1<2). Thus the process is terminated and the frequent item set and 4-tree candidate pattern are not prepared. Hence this relation is neglected.


Table 18. Matching joins for \({U_i}\)\({L_j}\)\({T_k}\)\({S_m}\)


By the illustrated example we have found a strong associated tree among sets \({C_{2}^{4}}\)and \({C_{3}^{4}}\). Here relation \({U_i}\)\({T_k}\) and \({U_i}\)\({T_k}\)\({S_m}\) are the stronger relations among all the relations. These relations show that these mobile accessing patterns are the most frequent relations. By these obtained relations one can predict that, if we know the user id and time, then services can be easily identified. According to this illustration the location parameter is less important for service prediction. These mined patterns are also helpful for future prediction and recommendation of services.



We evaluate the performance of the proposed algorithm in this section. The experiments were performed on a 3.0 GHz processor with 2GB of memory and the operating system Microsoft Windows 7. The algorithms are implemented in Java. The experiment was conducted on various parameters which are shown in Table 19.

Table 19. Parameter settings


5.1. Analysis Case 1-Different Node Counts

In this experiment, the number of mobile access patterns was set to 5,000 and 10,000. Here the different node counts are found with respect to different minimum support values. Figures 12 and 13 show that while the minimum support value increased from 0.1% to 1%, the number of nodes also decreased. Figures 12 and 13 also show that \({C_{2}^{4}}\)has the highest number of associated sub tree patterns. \({C_{1}^{4}}\)had the lowest number of associated sub tree patterns.


Fig. 12 No. of Nodes with different minimum support when maxflow Database=5000


Fig. 13 No. of Nodes with different minimum support when maxflow Database=10000 


5.2. Analysis Case 2-Different Item Counts

In this experiment, the number of mobile access patterns was again set to 5,000 and 10,000. Figures 14 and 15 show the performance result with respect to different minimum support values. Figures 14 and 15 show that as the minimum support value varied from 0.1% to 1% the number of items decreases. 


5.3. Analysis Case 3-Different Mobile Access Patterns

In this analysis, we have compared the number of nodes in associated tree patterns and the number of mobile access patterns with respect to different minimum support values. Figures 16 to18 show these comparison results. Figure 16 shows the number of nodes and mobile access patterns with respect to min support=0.2%. Figure 16 shows that the number of nodes increased, while the number of mobile access patterns increased. The variation also shows between number of nodes and mobile access patterns while minimum support is 0.5% and 0.8% respectively. This variation is shown in Figures 17 and 18 respectively.


Fig. 16 Nodes and mobile access patterns with respect to 0.2% minimum support


Fig. 17 Nodes and mobile access patterns with respect to 0.5% minimum support


Fig. 18 Nodes and mobile access patterns with respect to 0.8% minimum support


5.4. Discussion

In this subsection experimental inferences are discussed. By the above experiments, the proposed associated tree based approach is shown to outperform the state-of-the-art approach Apriori process. The experimental results show that the proposed approach takes less time as compared to a basic association rule generation Apriori process. Execution time comparisons are shown in Figure 19. Table 20 shows the number of generated patterns with both approaches. Thus, the performance of the associated tree based approach is the best among the compared approaches. The proposed approach is also better in comparison with memory utilization.

Table 20. Number of patterns with compared approaches


Fig. 19 Execution time in response to change in different minimum support



In this paper, we proposed an approach to generate strong frequent patterns between different mobile accessing parameters including user, location, dwell time, and web services. These patterns are generated by the matching joins and presented as associated trees. The proposed approach generates a k-tree frequent pattern in the maxflow database according to defined support values. By the experimental results under the various simulated data, the proposed approach is valuable for recommending and predicting services for different users. The proposed approach is also helpful in business and e-commerce environments where web services are important. The comparison of this approach is done with standard Apriori algorithm, in which we find that the results of the proposed approach are excellent.For future work, we plan to explore more efficient mobile pattern generation algorithms, and design more efficient frameworks to predict mobile services. In addition, we plan to apply some specific constraints in mining processes to achieve efficient behavior of mobile users. It is also planned to find service patterns according to utility or importance bases.



The authors would like to thank editors and referees for their helpful comments.


  1. Agrawal, R. & Srikant, R. (1994). Fast algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference of Very Large Databases, 487-499.
  2. Chen, T. S., Chou, Y. S. & Chen, T. C. (2012). Mining user movement behavior patterns in a mobile service environment. IEEE Transactions on system, man, and Cybernetics Part-A Syst. Humans, 42(1), 87-101.
  3. Cheng, H., Yan, X. & Han, J. (2004). IncSpan: Incremental mining of sequential patterns in a large database. In Proceedings of the 10th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, Seattle, WA, 527-532.
  4. Fayyazi, M., Kaeli, D. & Meleis, W. (2004). Parallel maximum weight bipartite matching algorithms for scheduling in input-queued switches. In Proceedings of the 18th IPDPS, Santa Fe, NM, 4-11.
  5. Gao,H., Tang, J., Hu, X. & Liu, H. (2013). Modeling temporal effects of human mobile behavior on location-based social networks. The 22nd ACM International Conference on Information and Knowledge Management CIKM 2013, San Francisco, USA.
  6. Huang, Y. F. & Lin, K.H. (2008). Global data allocation based on user behaviors in mobile computing environments. Comput. Commun., 31(10), 2420-2427.
  7. Huang, J. L., Chen, M. S. & Peng, W.C. (2003). Exploring group mobility for replica data allocation in a mobile environment. In Proceedings of the ACM Int. Conf. Inf. Knowl. Manage., New Orleans, LA, 161-168.
  8. Ilyas, I. F., Aref, W. G., & Elmagarmid, A. K.(2004). Supporting top-k join queries in relational databases. J. Very Large Databases, 13(3), 207-221.
  9. Kiukkonen, N., Blom, J., Dousse, O. & Laurila, J. K. (2010). Towards rich mobile phone datasets: Lausanne data collection campaign. ICPS 2010: The 7th International Conference on Pervasive Services, Berlin.
  10. Lancieri, L. & Durand, N. (2006). Internet user behavior: Compared study of the access traces and application to the discovery of communities. IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, 36(1), 208-219.
  11. Lee, S-C., Paik, J., Ok, J., Song, I., & Kim, U-M. (2007). Efficient mining of user behaviors by temporal mobile access patterns. Int. J. Comput. Sci. Security, 7(2), 285-291.
  12. Lee, W-P. (2007). Deploying personalized mobile services in an agent based environment. Expert Syst. Appl., 32(4), 1194-1207.
  13. Liu, H. & Keselj, V. (2007). Combined mining of web serve logs and web contents for classifying user navigation patterns and predicting users future requests. Data Knowl. Eng., 61(2), 304-330.
  14. Mohbey, K. K.& Thakur, G. S. (2013). User movement behavior analysis in mobile service environment. British Journal of Mathematics & Computer Science, 3(4), 822-834.
  15. Monnot, J. & Toulouse, S. (2007). The path partition problem and related problems in bipartite graphs. Oper. Res. Lett., 35(5), 677-684.
  16. Pabarskaite, Z. & Raudys, A. (2007). A process of knowledge discovery from web log data: Systematization and critical review. J. Intell. Inf. Syst., 28(1), 79-104.
  17. Peng, W. C. & Chen, M. S. (2005). Shared data allocation in a mobile computing system: Exploring local and global optimization. IEEE Trans. Parallel Distributed System, 16(4), 374-384.
  18. Peng, W. C. & Chen, M. S. (2003). Developing data allocation schemes by incremental mining of user moving patterns in a mobile computing system. IEEE Trans. Knowl. Data Eng., 15(1), 70-85.
  19. Perez, I. J., Cabrerizo, F. J., & Viedma, E. H. (2010). A mobile decision support system for dynamic group decision making problem. IEEE Trans. system, management cybernetics, A, System Humans, 40(6), 1244-1256.
  20. Terziyan, V. & Vitko, O. (2003). Bayesian metanetworks for modelling user preferences in mobile environment. In KI 2003: Advances in artificial intelligence. Berlin, Germany: Springer-Verlag, 370-384.
  21. Tsai, H. W., Chu, C. P., & Chen, T. S. (2007). Mobile object tracking in wireless sensor networks. Comput. Commun., 30(8), 1811-1825.
  22. Tseng, V. S., Lu, R. H. C., & Huang, C. H. (2007). Mining temporal mobile sequential patterns in location-based service environments. In Proceedings of the 13th ICPADS, Hsinchu, Taiwan, 1, 1-8.
  23. Tseng, V. S. & Lu, E. H. C. (2009). Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns. Journal of System & Software, 82(4), 697-706.
  24. Yavas, G., Katsaros, D., Ulusoy, O., & Manolopoulos, Y. (2005). A data mining approach for location prediction in mobile environments. Data Knowl. Eng., 54(2), 121-146.