Behavioral Entropy of a Cellular Phone User

  • Santi Phithakkitnukoon
  • Husain Husna
  • Ram Dantu


The increase of advanced service offered by cellular networks draws lots of interest from researchers to study the networks and phone user behavior. With the evolution of Voice over IP, cellular phone usage is expected to increase expo- nentially. In this paper, we analyze the behavior of cellular phone users and identify behavior signatures based on their calling patterns. We quantify and infer the re- lationship of a person’s randomness levels using information entropy based on the location of the user, time of the call, inter-connected time, and duration of the call. We use real-life call logs of 94 mobile phone users collected at MIT by the Real- ity Mining Project group for a period of nine months. We are able to capture the user’s calling behavior on various parameters and interesting relationship between randomness levels in individual’s life and calling pattern using correlation coeffi- cients and factor analysis. This study extends our understanding of cellular phone user behavior and characterizes cellular phone users in forms of randomness level.


Randomness Level Information Entropy Scree Plot Phone User Mobile Phone User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Massachusetts Institute of Technology: Reality Mining Project. Available: Scholar
  2. 2.
    Eagle, N., and Pentlend, A.: Reality Mining: Sensing Complex Social Systems. Personal and Ubiquitous Computing, Vol. 10, No. 4, 2006.Google Scholar
  3. 3.
    Shanon, C.E.: A mathematical theory of communication. Bell System Technical Journal, Vol. 27, pp.379-423 and 623-656, July and October 1948.Google Scholar
  4. 4.
    Cohen, J.: Statistical power analysis for the behavioral sciences. 2nd ed. Lawrence Erlbaum Associates,Hillsdale, NJ, 1988.MATHGoogle Scholar
  5. 5.
    Jolliffe, I. T.: Principal ComponentAnalysis. 2nd ed. Springer Science+BusinessMedia, 1986, New York USA.Google Scholar
  6. 6.
    Eagle, N., Pentland, A., and Lazer, D.: Infering social network structure using mobile phone data. Proc. of National Academy of Sciences, 2006.Google Scholar
  7. 7.
    Cattell, R. B., and Vogelmann, S.: A Comprehensive trial of the scree and KG criteria for determining the number of factors. Mult. Behav. Res., Vol. 12, pp. 289-325, 1977.CrossRefGoogle Scholar
  8. 8.
    Kaiser, H.F.: The application of electronic computers to factor analysis. Educ. Psychol.Meas. 20, 141e-151, 1960.CrossRefGoogle Scholar
  9. 9.
    De Groen, P.: An introduction to total least squares. in Nieuw Archief voor Wiskunde, Vierde serie, deel 14, 1996, pp. 237-253.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Santi Phithakkitnukoon
    • 1
  • Husain Husna
    • 1
  • Ram Dantu
    • 1
  1. 1.Department of Comp. Sci.&Eng.University of North Texas

Personalised recommendations