In this paper, we apply an accurate millimeter wave (mmWave) path loss model, obtained from outdoor measurement operated at 39 GHz in Qingdao, China, into the stochastic geometry analysis to investigate the system per...
详细信息
The interactive behavior of comments within the user group on microblog website is bidirectional and dynamic, reflecting the level of familiarity among users. Predicting the future comment interaction behavior within ...
详细信息
Propaganda information that aims at influencing people's opinions is becoming more and more common around people, especially through social media. For the detection of propaganda content, researchers have conducte...
详细信息
Network traffic is very important for testing network equipment, network services, and security products. A new method of generating traffic based on statistical packet-level characteristics is proposed. In every time...
详细信息
Network traffic is very important for testing network equipment, network services, and security products. A new method of generating traffic based on statistical packet-level characteristics is proposed. In every time unit, the generator determines the sent packets number, the type and size of every sent packet according to the statistical characteristics of the original traffic. Then every packet, in which the protocol headers of transport layer, network layer and ethernet layer are encapsulated, is sent via the responding network interface card in the time unit. The results in the experiment show that the correlation coefficients between the bandwidth, the packet number, packet size distribution, the fragment number of the generated network traffic and those of the original traffic are all more than 0.96. The generated traffic and original traffic are very highly related and similar.
A quality-of-service(QoS)aware scheme,called precautionary performance monitoring,is proposed to solve the optical impairments and congestion control in coherent optical orthogonal frequency division multiplexed(CO...
详细信息
A quality-of-service(QoS)aware scheme,called precautionary performance monitoring,is proposed to solve the optical impairments and congestion control in coherent optical orthogonal frequency division multiplexed(CO-OFDM)*** centralized path computation element(PCE)extensions based on the QoS level are applied to optical performance monitoring in this letter.
With the advent of online chatting systems, conversation structure modeling has attracted increasing attention and can be beneficial to many downstream tasks such as topic summarization and dialog generation. Existing...
详细信息
Recently, the global air traffic has increased rapidly, most passengers choose to buy tickets in their own experiences. So accurately predicting flight ticket price is of great significance. Recently there exist some ...
详细信息
Insider threat makes enterprises or organizations suffer from the loss of property and the negative influence of reputation. User behavior analysis is the mainstream method of insider threat detection, but due to the ...
详细信息
Tree pruning is an effective algorithm to reduce the complexity of sphere detection (SD) for multiple-input multiple-output (MIMO) communication systems. How to determine the tree pruning rule, as well as by what ...
详细信息
Tree pruning is an effective algorithm to reduce the complexity of sphere detection (SD) for multiple-input multiple-output (MIMO) communication systems. How to determine the tree pruning rule, as well as by what the tradeoff between the performance and the complexity can be achieved, is still an open problem. In this paper, a tree pruning algorithm is proposed based on minimum mean square error (MMSE) detection. The proposed algorithm first preforms MMSE detection since the complexity of MMSE detection is very low. Then the pruning constraints will be set according to the scaled path metrics of the MMSE solution. The choice of the scale factors and their influences on the complexity and performance are also discussed. Through analysis and simulations, it is shown that the complexity is reduced significantly with negligible performance degradation and additional computations.
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a...
详细信息
暂无评论