{"id":9452,"date":"2021-06-21T14:47:17","date_gmt":"2021-06-21T12:47:17","guid":{"rendered":"https:\/\/web.computaex.es\/?page_id=9452"},"modified":"2025-08-26T14:50:30","modified_gmt":"2025-08-26T12:50:30","slug":"a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis","status":"publish","type":"page","link":"https:\/\/computaex.es\/en\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/","title":{"rendered":"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis"},"content":{"rendered":"<div class=\"field field-name-field-pub-descripcion field-type-text-long field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p>In recent years, network operators are receiving an outsize amount of data due to the increasing number of mobile network subscribers, network services and device signalling. This trend increases with the deployment of 5G that will provide advanced connectivity to wireless devices and develop new services. Network analytics must allow telecommunications operators to improve their services and the infrastructure extracting useful information from large amounts of data. A methodology based on orthogonal projections was developed in order to analyze the network information and facilitate the management and the operations to network providers. In the current study, different key points selection algorithms are investigated in order to make a quantitative and qualitative evaluation and analyze the performance of those algorithms which use different approaches to select these points, which will be utilized in the methodology. A novel synthetic data set has also been developed to statistically evaluate the effect of the key points selection algorithms in the clustering, as well as, measure the performance of the aforementioned methodology. Finally, these key points selection algorithms are used in a real scenario to evaluate the impact of the different approaches in the analysis.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"field field-name-field-pub-fuente field-type-text-long field-label-above\">\n<div class=\"field-label\"><strong>Fuente de la publicaci\u00f3n:\u00a0<\/strong><\/div>\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<ul>\n<li>D. Cort\u00e9s-Polo, L. I. J. Gil, J. -L. Gonz\u00e1lez-S\u00e1nchez and J. Carmona-Murillo, \u00abA Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis,\u00bb in\u00a0IEEE Access, vol. 9, pp. 92030-92042, 2021, doi:\u00a0<a href=\"https:\/\/doi.org\/10.1109\/ACCESS.2021.3092596\" target=\"_blank\" rel=\"noopener\">10.1109\/ACCESS.2021.3092596.<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In recent years, network operators are receiving an outsize amount of data due to the increasing number of mobile network subscribers, network services and device signalling. This trend increases with &#8230;<\/p>","protected":false},"author":1,"featured_media":0,"parent":1583,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[112,91],"tags":[],"class_list":["post-9452","page","type-page","status-publish","hentry","category-112","category-publicaciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis - Fundaci\u00f3n COMPUTAEX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computaex.es\/en\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis - Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"og:description\" content=\"In recent years, network operators are receiving an outsize amount of data due to the increasing number of mobile network subscribers, network services and device signalling. This trend increases with ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computaex.es\/en\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/computaex\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T12:50:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/08\/COMPUTAEX.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"403\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@computaex\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/\",\"url\":\"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/\",\"name\":\"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis - Fundaci\u00f3n COMPUTAEX\",\"isPartOf\":{\"@id\":\"https:\/\/computaex.es\/#website\"},\"datePublished\":\"2021-06-21T12:47:17+00:00\",\"dateModified\":\"2025-08-26T12:50:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/computaex.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publicaciones\",\"item\":\"https:\/\/computaex.es\/publicaciones\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computaex.es\/#website\",\"url\":\"https:\/\/computaex.es\/\",\"name\":\"Fundaci\u00f3n COMPUTAEX\",\"description\":\"COMPUTAEX\",\"publisher\":{\"@id\":\"https:\/\/computaex.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computaex.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computaex.es\/#organization\",\"name\":\"COMPUTAEX\",\"url\":\"https:\/\/computaex.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"contentUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"width\":2560,\"height\":970,\"caption\":\"COMPUTAEX\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/m.facebook.com\/computaex\/\",\"https:\/\/x.com\/computaex\",\"https:\/\/es.linkedin.com\/company\/cenits\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis - Fundaci\u00f3n COMPUTAEX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computaex.es\/en\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/","og_locale":"en_US","og_type":"article","og_title":"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis - Fundaci\u00f3n COMPUTAEX","og_description":"In recent years, network operators are receiving an outsize amount of data due to the increasing number of mobile network subscribers, network services and device signalling. This trend increases with ...","og_url":"https:\/\/computaex.es\/en\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/","og_site_name":"Fundaci\u00f3n COMPUTAEX","article_publisher":"https:\/\/m.facebook.com\/computaex\/","article_modified_time":"2025-08-26T12:50:30+00:00","og_image":[{"width":1024,"height":403,"url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/08\/COMPUTAEX.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@computaex","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/","url":"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/","name":"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis - Fundaci\u00f3n COMPUTAEX","isPartOf":{"@id":"https:\/\/computaex.es\/#website"},"datePublished":"2021-06-21T12:47:17+00:00","dateModified":"2025-08-26T12:50:30+00:00","breadcrumb":{"@id":"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/computaex.es\/publicaciones\/a-quantitative-and-comparative-evaluation-of-key-points-selection-algorithms-for-mobile-network-data-sets-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/computaex.es\/"},{"@type":"ListItem","position":2,"name":"Publicaciones","item":"https:\/\/computaex.es\/publicaciones\/"},{"@type":"ListItem","position":3,"name":"A Quantitative and Comparative Evaluation of Key Points Selection Algorithms for Mobile Network Data Sets Analysis"}]},{"@type":"WebSite","@id":"https:\/\/computaex.es\/#website","url":"https:\/\/computaex.es\/","name":"COMPUTAEX Foundation","description":"COMPUTAEX","publisher":{"@id":"https:\/\/computaex.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computaex.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computaex.es\/#organization","name":"COMPUTAEX","url":"https:\/\/computaex.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/","url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","contentUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","width":2560,"height":970,"caption":"COMPUTAEX"},"image":{"@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/m.facebook.com\/computaex\/","https:\/\/x.com\/computaex","https:\/\/es.linkedin.com\/company\/cenits"]}]}},"_links":{"self":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/9452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/comments?post=9452"}],"version-history":[{"count":1,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/9452\/revisions"}],"predecessor-version":[{"id":9453,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/9452\/revisions\/9453"}],"up":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/pages\/1583"}],"wp:attachment":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/media?parent=9452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/categories?post=9452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/tags?post=9452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}