CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Critical Analysis of Recent Location Management Methods in Mobile Computing Environment

Published on February 2013 by Sheetal B. Soneji, V. M. Thakhare, Swati S. Sherekar
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 7
February 2013
Authors: Sheetal B. Soneji, V. M. Thakhare, Swati S. Sherekar
e53da7af-4adf-4297-a4b6-3272ca8e0afa

Sheetal B. Soneji, V. M. Thakhare, Swati S. Sherekar . Critical Analysis of Recent Location Management Methods in Mobile Computing Environment. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 7 (February 2013), 26-31.

@article{
author = { Sheetal B. Soneji, V. M. Thakhare, Swati S. Sherekar },
title = { Critical Analysis of Recent Location Management Methods in Mobile Computing Environment },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 7 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 26-31 },
numpages = 6,
url = { /proceedings/icrtitcs2012/number7/10296-1410/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Sheetal B. Soneji
%A V. M. Thakhare
%A Swati S. Sherekar
%T Critical Analysis of Recent Location Management Methods in Mobile Computing Environment
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 7
%P 26-31
%D 2013
%I International Journal of Computer Applications
Abstract

Location management is a technique, managing various mobile services, mobile devices, predicating their position at time of reference to its base station operation. It helps to keep track of mobile device during agile environment which helps to communicate user while roaming. With location management one can access data at any place by requesting to respective base station. Location management technique changes as per need of the user with reference to the contents such as audio, video, text and graphics. So, here performance evaluation of various location management methods with their application, advantages and limitations is taken into account. These methods can work very effective and efficient in particular conditions with certain constraints. Speed is main factor which affect the communication. This paper presents the critical analysis of various methods of location management based on various methodologies for mobile devices. It describes various techniques for location prediction and management. Some of the limitations in earlier techniques are tried to overcome in next subsequent method by another author. This study analyses all these methods with their pro and cons. But still they have some limitation of position prediction and speed of access during location management.

References
  1. Yucel Saygin: Exploiting Data Mining Technique For Broadcasting Data in Mobile Computing Enviornments:IEEE Transaction On Knowledge And Data Engineering VOL. 14, No. 6: Nov 2002.
  2. Watson: Data Mining Analyticcs For Competitive Intelligence Decision Support: IBM research division :2002.
  3. Smriti Pandey et. Al : Exploiting Need of Hetrogeneous Data Mining Environment Based on Mobile Computing Enviorment:International Journal of Computer Application Vol. 10 No. 9 November 2010.
  4. Frederic Stahl et. Al. "Pocket Data Mining: Towards Collaborative Data Mining in Mobile Computing Environments", In: IEEE 22nd International Conference on Tools with Artificial Intelligence (ICTAI 2010), 27-29 October, 2010.
  5. Ganesh Raj Kushwaha et. al , "A Survey on Mining services for Better Enhancement in Small HandHeld Devices", International Journal of Computer Applications (0975 – 8887) Volume 6– No. 1, September 2010.
  6. Sungchae Lim, "A Tunable Checkpointing Algorithm for the Distributed Mobile Environment" , IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011.
  7. Christ Cheng et. al. "Location Prediction Algorithm for Mobile Wireless System", September 2010.
  8. N. Mallikharjuna Rao1 "An Intelligent Software Workflow Process Design for Location Management on Mobile Devices" (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 1, No. 5, November 2010.
  9. Suparna Biswas et. Al: "A Mobility-Based Checkpointing Protocol For Mobile Computing System" International Journal of Computer Science and Information Technology (IJCSIT) Vol. 2 , No. 1 Febuary 2010.
  10. Parveen Kumar et. Al: "Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems" IJCSI International Journal of Computer Science Issues, Vol. 7, Issu 3, No 5, May 2010.
  11. Dashun Wang et. Al: "Human Mobility, Social Ties, and Link Prediction", KDD'11 ACM 978-1-4503-0813-7 August 21–24, 2011.
  12. Amar Pratap Singh J et. Al. "UPH a New Approach in Location Management System" European Journal of Scientific Research ISSN 1450-216X Vol. 67 No. 3 pp. 338-348 , 2012.
  13. Marco Gruteser et. al. "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking",2011.
  14. Christoph Rensing et. al. "Location based Learning Content Authoring and Content Access in the docendo platform", IEEE International Conference on Prevasive Computing and Communication in March 2011.
  15. Sini Anna Alex et. al. "Distance Based Location Updation -"Graphical Method Using Cell Cordinates", International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc . of CSIT vol. 1 IACSIT Press, Singapore,2011.
  16. Claudio A. Ardagna et. al. , "An Obfuscation-Based Approach for Protecting Location Privacy" , IEEE Transactions On Dependable and Secure Computing, Vol. 8, no. 1, January-February 2011.
  17. Z. Yao et al. , " Spreading Code Phase Measurement Technique for Snapshot GNSS Receiver", 1The authors are with the Department of Electronic Engineering, Tsinghua University, Beijing IEEE 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Ma Mobile Agent Vlr Hlr Manet gsm Gprs