Internet traffic monitoring and traffic characterization are essential for managing and optimizing network infrastructures. In general, the traffic classifier based on Machine Learning (ML) might not perform well for ...
详细信息
Internet traffic monitoring and traffic characterization are essential for managing and optimizing network infrastructures. In general, the traffic classifier based on Machine Learning (ML) might not perform well for some cases such as imbalanced data sets. To address this issue, we propose an evaluation measure aiming for the case of imbalance multi-class network traffic classification based on the multi-objective metric, the area under the ROC (Receiver Operating Characteristic) curve, or simply AUC. The experiments show that our method is more sensitive in the case that the Minority classes being misclassified into the Majority classes than the otherwise. Hence, we could use this measure to evaluate the classifier performance in the distinguishing of misclassifying the Minority applications into the Majority applications.
In this paper,we propose an overlapped clustering scheme to decide the cooperation cells for coordinated multi- point (CoMP) *** the scenario of joint processing of CoMP,the cooperated cells jointly transmit for users...
详细信息
ISBN:
(纸本)9781467321006
In this paper,we propose an overlapped clustering scheme to decide the cooperation cells for coordinated multi- point (CoMP) *** the scenario of joint processing of CoMP,the cooperated cells jointly transmit for users so the inter- cell interference among the cooperation cells are ***,the cluster-edge users suffer from the inter-cluster *** overlapping patterns are defined for the cluster-edge users to make sure that these users become the overlapping cluster-center *** the overlapping patterns and clusters are allocated orthogonal frequency resource,which can cancel inter-cluster interference and improve the performance of cell-edge *** results show that the proposed overlapped clustering scheme yields significant improvement to cell-edge users’ spectrum efficiency as well as increasing average cell throughput.
In this paper, we propose a new blind spectrum sensing method based on the polarization vector's orientation characteristics of the received signal. We first discuss a spectrum sensing model based on polarization ...
详细信息
In this paper, we propose a new blind spectrum sensing method based on the polarization vector's orientation characteristics of the received signal. We first discuss a spectrum sensing model based on polarization characteristic and develop the directional statistics of a polarization vector which can be used to discriminate the signal and noise. Then, a new polarization sensing algorithm (GLRT-PV) is introduced based on the generalized likelihood ratio test (GLRT) paradigm. Applying the recent advances in directional statistics, we derive closed-form expressions of both the probability of false alarm and the probability of detection. Our simulation results show that the proposed GLRT-PV method exhibits better performance than other existing methods in the case of unknown primary transmitter polarization and/or in the presence of noise power uncertainty.
In this paper, A power-saving scheduling algorithm (PSA) for mixed multicast and unicast traffic is proposed in multicast and broadcast single frequency network (MBSFN). This algorithm is designed on the purpose of re...
详细信息
In this paper, A power-saving scheduling algorithm (PSA) for mixed multicast and unicast traffic is proposed in multicast and broadcast single frequency network (MBSFN). This algorithm is designed on the purpose of reducing the terminal's energy consumption and improving system capacity. By MBSFN area scheduling scheme the throughput of multicast users is increased. And the users' energy consumption is reduced by decreasing the transition times between sleeping and active status in the use of discontinuous reception (DRX) mechanism which is applied for terminal's battery power saving in LTE. The simulation results show that the proposed strategy gains an improvement both in system throughput and the terminal's energy efficiency.
In cellular networks, multiple relay nodes can be deployed in one cell, so there are three transmission modes, direct transmission (DT), two-hop transmission (TT) and cooperative transmission (CT). Combining with the ...
详细信息
The increasing number of mobile terminals facilitates the development of context-aware applications. However, developing a context aware application is still a complex work, which involves mechanisms of context acquis...
详细信息
The increasing number of mobile terminals facilitates the development of context-aware applications. However, developing a context aware application is still a complex work, which involves mechanisms of context acquisition and context processing. In order to release the developer’s burden, many context aware frameworks emerged. But none of them yet has sufficient consideration of mobile environment characteristics. Besides, restricted to the mobile platform, the developed application could not achieve cross-platform deployment. A cross-platform context-aware application developing framework for mobile terminals is proposed in this paper. This framework could shield system differences, centralize context acquisition, context modeling, context storing, context interpretation and context aggregation for many context aware applications on the same terminal. Applying the framework, data of same sensor would not be duplicated processed by many context aware applications. Context aware application would be built faster. And mobile terminal resources would be used more efficiently.
The identification and classification of network traffic is an important prerequisite for network management,traffic engineering and other *** summarize the packet size distribution patterns of the lnternet applicatio...
详细信息
The identification and classification of network traffic is an important prerequisite for network management,traffic engineering and other *** summarize the packet size distribution patterns of the lnternet application traffic,we collected flow record data from the intemet and analyzed the packet size distribution patterns of typical *** the packet size distribution patterns of single application servers of typical applications,we found the differences of the packet size distribution in different *** we clustered and analyzed different packet size distribution patterns for typical applications,and found that a typical Internet application could contain more than one packet size distribution ***,from the characteristics of these applications,we explain the causes of these distribution patterns.
Owing to the strong character expressive power,regular expressions gradually replace explicit string and become the first choice of patterns describing *** the current network security products,huge amount of patterns...
详细信息
Owing to the strong character expressive power,regular expressions gradually replace explicit string and become the first choice of patterns describing *** the current network security products,huge amount of patterns lead to dramatic increase of the DFA storage space and affect the efficiency of *** paper presents a regular expression grouping algorithm based on partitioning *** reduces the total number of DFA states and improves the matching performance which is also suitable for multi-core processor.
While multi-channel allocation has been studied in many networks by different theories,asymmetric channel characteristics are seldom *** paper considers the channel selection problem in wireless Ad hoc networks from t...
详细信息
ISBN:
(纸本)9781467321006
While multi-channel allocation has been studied in many networks by different theories,asymmetric channel characteristics are seldom *** paper considers the channel selection problem in wireless Ad hoc networks from the game-theoretic viewpoint,which is based on the assumption that quality discrepancy exists between the candidate channels.A simple saturation throughput model is presented to quantify to the utility of each *** mixed Nash Equilibrium (NE) model is used to analyze the channel selection,and a mixed strategy algorithm is proposed to maximize the throughput and also improve the fairness of channel *** results confirm that the proposed mixed game model is effective,and the mixed strategy can improve the network throughput greatly.
The efficiency of multiple pattern matching is the core technology of Deep Packet Inspection and it is important to the real word of internet traffic *** this research we propose a new multiple pattern matching techni...
详细信息
The efficiency of multiple pattern matching is the core technology of Deep Packet Inspection and it is important to the real word of internet traffic *** this research we propose a new multiple pattern matching technique for the fixed pattern in the packet load,which is called I-HASH multiple various position pattern matching *** is used to improve the matching speed through the *** algorithm is implemented in our experiments and compared with the existing *** results demonstrate that our algorithm is much more effective than STRCMP algorithm,especially when the number of patterns is quiet *** will be extraordinarily helpful in the areas of Internet application identification system and network intrusion detection system and so on,which contain huge amounts of fixed patterns.
暂无评论