期刊文献+
共找到3,823篇文章
< 1 2 192 >
每页显示 20 50 100
An Unknown Trojan Detection Method Based on Software Network Behavior 被引量:2
1
作者 LIANG Yu PENG Guojun +1 位作者 ZHANG Huanguo WANG Ying 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期369-376,共8页
Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) atta... Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) attack intents: besides dealing with damaging or destroying facilities, the more essential purpose of APT attacks is to gather confidential data from target hosts by planting Trojans. Inspired by this idea and some in-depth analyses on recently happened APT attacks, five typical communication characteristics are adopted to describe application’s network behavior, with which a fine-grained classifier based on Decision Tree and Na ve Bayes is modeled. Finally, with the training of supervised machine learning approaches, the classification detection method is implemented. Compared with general methods, this method is capable of enhancing the detection and awareness capability of unknown Trojans with less resource consumption. 展开更多
关键词 targeted attack unknown Trojan detection software network behavior machine learning
原文传递
Trust evolvement method of Web service combination based on network behavior
2
作者 刘济波 向占宏 朱培栋 《Journal of Central South University of Technology》 EI 2008年第4期558-563,共6页
Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the met... Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the method,the control rule of the trust degree in the Dempster-Shafer(D-S)rule was utilized based on the entity network interactive behavior,and a proportion trust control rule was put up.The control rule could make the Web service self-adaptively study so as to gradually form a proper trust connection with its cooperative entities and to improve the security performance of the whole system.The experimental results show that the historical successful experience is saved during the service combination alliance,and the method can greatly improve the reliability and success rate of Web service combination. 展开更多
关键词 network behavior Web service combination trust evolvement Dempster-Shafer rule
在线阅读 下载PDF
Research on College Frustrated Students' Network Mentality and Behaviors
3
作者 Zichen YIN 《International Journal of Technology Management》 2015年第4期6-8,共3页
Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this... Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this paper explores the causes of network behavior anomie for college students, which mainly include: dissatisfaction in real communication, game addiction to the network, craving online pornography, and hooking on online shopping. In addition, it also investigates the ways to wipe out mental frustration in such a cyber era. These ways mainly are to strenzthen online education and management, to make psychological counseling, and to carry on frustration education. 展开更多
关键词 college students network behaviors causes of network behavior anomie ways to overcome mental frustration
在线阅读 下载PDF
Efficient Feature Extraction Using Apache Spark for Network Behavior Anomaly Detection 被引量:2
4
作者 Xiaoming Ye Xingshu Chen +4 位作者 Dunhu Liu Wenxian Wang Li Yang Gang Liang Guolin Shao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期561-573,共13页
Extracting and analyzing network traffic feature is fundamental in the design and implementation of network behavior anomaly detection methods. The traditional network traffic feature method focuses on the statistical... Extracting and analyzing network traffic feature is fundamental in the design and implementation of network behavior anomaly detection methods. The traditional network traffic feature method focuses on the statistical features of traffic volume. However, this approach is not sufficient to reflect the communication pattern features. A different approach is required to detect anomalous behaviors that do not exhibit traffic volume changes, such as low-intensity anomalous behaviors caused by Denial of Service/Distributed Denial of Service (DoS/DDoS) attacks, Internet worms and scanning, and BotNets. We propose an efficient traffic feature extraction architecture based on our proposed approach, which combines the benefit of traffic volume features and network communication pattern features. This method can detect low-intensity anomalous network behaviors and conventional traffic volume anomalies. We implemented our approach on Spark Streaming and validated our feature set using labelled real-world dataset collected from the Sichuan University campus network. Our results demonstrate that the traffic feature extraction approach is efficient in detecting both traffic variations and communication structure changes. Based on our evaluation of the MIT-DRAPA dataset, the same detection approach utilizes traffic volume features with detection precision of 82.3% and communication pattern features with detection precision of 89.9%. Our proposed feature set improves precision by 94%. 展开更多
关键词 feature extraction graph theory network behavior anomaly detection Apache Spark
原文传递
Research on behavior recognition algorithm based on SE-I3D-GRU network 被引量:4
5
作者 Wu Jin Yang Xue +1 位作者 Xi Meng Wan Xianghong 《High Technology Letters》 EI CAS 2021年第2期163-172,共10页
In order to effectively solve the problems of low accuracy and large amount of calculation of current human behavior recognition,a behavior recognition algorithm based on squeeze-and-excitation network(SENet) combined... In order to effectively solve the problems of low accuracy and large amount of calculation of current human behavior recognition,a behavior recognition algorithm based on squeeze-and-excitation network(SENet) combined with 3 D Inception network(I3 D) and gated recurrent unit(GRU) network is proposed.The algorithm first expands the Inception module to three-dimensional,and builds a network based on the three-dimensional module,and expands SENet to three-dimensional,making it an attention mechanism that can pay attention to the three-dimensional channel.Then SENet is introduced into the 13 D network,named SE-I3 D,and SENet is introduced into the CRU network,named SE-GRU.And,SE-13 D and SE-GRU are merged,named SE-13 D-GRU.Finally,the network uses Softmax to classify the results in the UCF-101 dataset.The experimental results show that the SE-I3 D-GRU network achieves a recognition rate of 93.2% on the UCF-101 dataset. 展开更多
关键词 behavior recognition squeeze-and-excitation network(SENet) Incepton network gated recurrent unit(GRU)
在线阅读 下载PDF
Calculation of the Behavior Utility of a Network System: Conception and Principle 被引量:5
6
作者 Changzhen Hu 《Engineering》 2018年第1期78-84,共7页
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison, This paper describes sce- nes o... The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison, This paper describes sce- nes of network behavior as differential manifolds, Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathe- matical description of the network behavior path and behavior utility, Based on the principle of differen- tial geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility, We also provide a calculation framework for assessment of the network's attack-defense confrontation on the strength of behavior utility, Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior, 展开更多
关键词 network metric evaluation Differential MANIFOLD network behavior UTILITY network attack-defense CONFRONTATION
在线阅读 下载PDF
Constitutive modeling of compression behavior of TC4 tube based on modified Arrhenius and artificial neural network models 被引量:5
7
作者 Zhi-Jun Tao He Yang +2 位作者 Heng Li Jun Ma Peng-Fei Gao 《Rare Metals》 SCIE EI CAS CSCD 2016年第2期162-171,共10页
Warm rotary draw bending provides a feasible method to form the large-diameter thin-walled(LDTW)TC4 bent tubes, which are widely used in the pneumatic system of aircrafts. An accurate prediction of flow behavior of ... Warm rotary draw bending provides a feasible method to form the large-diameter thin-walled(LDTW)TC4 bent tubes, which are widely used in the pneumatic system of aircrafts. An accurate prediction of flow behavior of TC4 tubes considering the couple effects of temperature,strain rate and strain is critical for understanding the deformation behavior of metals and optimizing the processing parameters in warm rotary draw bending of TC4 tubes. In this study, isothermal compression tests of TC4 tube alloy were performed from 573 to 873 K with an interval of 100 K and strain rates of 0.001, 0.010 and0.100 s^(-1). The prediction of flow behavior was done using two constitutive models, namely modified Arrhenius model and artificial neural network(ANN) model. The predictions of these constitutive models were compared using statistical measures like correlation coefficient(R), average absolute relative error(AARE) and its variation with the deformation parameters(temperature, strain rate and strain). Analysis of statistical measures reveals that the two models show high predicted accuracy in terms of R and AARE. Comparatively speaking, the ANN model presents higher predicted accuracy than the modified Arrhenius model. In addition, the predicted accuracy of ANN model presents high stability at the whole deformation parameter ranges, whereas the predictability of the modified Arrhenius model has some fluctuation at different deformation conditions. It presents higher predicted accuracy at temperatures of 573-773 K, strain rates of 0.010-0.100 s^(-1)and strain of 0.04-0.32, while low accuracy at temperature of 873 K, strain rates of 0.001 s^(-1)and strain of 0.36-0.48.Thus, the application of modified Arrhenius model is limited by its relatively low predicted accuracy at some deformation conditions, while the ANN model presents very high predicted accuracy at all deformation conditions,which can be used to study the compression behavior of TC4 tube at the temperature range of 573-873 K and the strain rate of 0.001-0.100 s^(-1). It can provide guideline for the design of processing parameters in warm rotary draw bending of LDTW TC4 tubes. 展开更多
关键词 TC4 tube Compression behavior Constitutive model Modified Arrhenius model Neural network model
原文传递
The Research on E-mail Users' Behavior of Participating in Subjects Based on Social Network Analysis 被引量:3
8
作者 ZHANG Lejun ZHOU Tongxin +2 位作者 Qi Zhixin GUO Lin XU Li 《China Communications》 SCIE CSCD 2016年第4期70-80,共11页
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in... The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition. 展开更多
关键词 E-MAIL network social network ANALYSIS user behavior ANALYSIS KEYWORD selection
在线阅读 下载PDF
Container Networking Performance Analysis for Large-Scale User Behavior Simulation 被引量:1
9
作者 Yifang Ji Guomin Zhang +1 位作者 Shengxu Xie Xiulei Wang 《Journal of Computer and Communications》 2019年第10期136-146,共11页
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-... Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical resources. In a container-based virtualization environment, container networking is an important component. To evaluate the impact of different networking methods between the containers on the simulation performance, the typical container networking methods such as none, bridge, macvlan were analyzed, and the performance of different networking methods was evaluated according to the throughput and latency metrics. The experiments show that under the same physical resource constraints, the macvlan networking method has the best network performance, while the bridge method has the worst performance. This result provides a reference for selecting the appropriate networking method in the user behavior simulation process. 展开更多
关键词 Linux CONTAINER networkING Mode network Performance USER behavior SIMULATION
在线阅读 下载PDF
Deep Neural Network Based Behavioral Model of Nonlinear Circuits
10
作者 Zhe Jin Sekouba Kaba 《Journal of Applied Mathematics and Physics》 2021年第3期403-412,共10页
With the rapid growth of complexity and functionality of modern electronic systems, creating precise behavioral models of nonlinear circuits has become an attractive topic. Deep neural networks (DNNs) have been recogn... With the rapid growth of complexity and functionality of modern electronic systems, creating precise behavioral models of nonlinear circuits has become an attractive topic. Deep neural networks (DNNs) have been recognized as a powerful tool for nonlinear system modeling. To characterize the behavior of nonlinear circuits, a DNN based modeling approach is proposed in this paper. The procedure is illustrated by modeling a power amplifier (PA), which is a typical nonlinear circuit in electronic systems. The PA model is constructed based on a feedforward neural network with three hidden layers, and then Multisim circuit simulator is applied to generating the raw training data. Training and validation are carried out in Tensorflow deep learning framework. Compared with the commonly used polynomial model, the proposed DNN model exhibits a faster convergence rate and improves the mean squared error by 13 dB. The results demonstrate that the proposed DNN model can accurately depict the input-output characteristics of nonlinear circuits in both training and validation data sets. 展开更多
关键词 Nonlinear Circuits Deep Neural networks behavioral Model Power Amplifier
在线阅读 下载PDF
Empirical Study on Influence of Brand Crisis of Agricultural Products on Network Cluster Behavior of Consumers
11
作者 Chong GONG 《Asian Agricultural Research》 2016年第6期1-4,8,共5页
From the perspective of psychological contract,this paper discusses mechanism of consumers' network cluster behavior in the context of brand crisis. On the basis of Simmel's conflict theory,it presented new fi... From the perspective of psychological contract,this paper discusses mechanism of consumers' network cluster behavior in the context of brand crisis. On the basis of Simmel's conflict theory,it presented new findings of network cluster behavior. It is concluded that brand crisis exerts significant influence on breach of psychological contract. Particularly,functional brand crisis more easily leads to breach of transactional psychological contract,while value brand crisis more easily leads to breach of relational psychological contract. Breach of transactional psychological contract more easily leads to realistic network cluster behavior,while breach of relational psychological contract does not necessarily lead to non-realistic network cluster behavior. 展开更多
关键词 BRAND crisis network cluster behavior Breach of PSYCHOLOGICAL contract
在线阅读 下载PDF
A Co-Evolution Model for Dynamic Social Network and Behavior
12
作者 Liping Tong David Shoham Richard S. Cooper 《Open Journal of Statistics》 2014年第9期765-775,共11页
Individual behaviors, such as drinking, smoking, screen time, and physical activity, can be strongly influenced by the behavior of friends. At the same time, the choice of friends can be influenced by shared behaviora... Individual behaviors, such as drinking, smoking, screen time, and physical activity, can be strongly influenced by the behavior of friends. At the same time, the choice of friends can be influenced by shared behavioral preferences. The actor-based stochastic models (ABSM) are developed to study the interdependence of social networks and behavior. These methods are efficient and useful for analysis of discrete behaviors, such as drinking and smoking;however, since the behavior evolution function is in an exponential format, the ABSM can generate inconsistent and unrealistic results when the behavior variable is continuous or has a large range, such as hours of television watched or body mass index. To more realistically model continuous behavior variables, we propose a co-evolution process based on a linear model which is consistent over time and has an intuitive interpretation. In the simulation study, we applied the expectation maximization (EM) and Markov chain Monte Carlo (MCMC) algorithms to find the maximum likelihood estimate (MLE) of parameter values. Additionally, we show that our assumptions are reasonable using data from the National Longitudinal Study of Adolescent Health (Add Health). 展开更多
关键词 SOCIAL network SOCIAL behavior CO-EVOLUTION MARKOV CHAIN STATIONARY Distribution
暂未订购
Golay Code Clustering for Mobility Behavior Similarity Classification in Pocket Switched Networks
13
作者 Hongjun YU Tao Jing +1 位作者 Dechang Chen Simon Y. Berkovich 《通讯和计算机(中英文版)》 2012年第4期466-472,共7页
关键词 流动行为 交换网络 相似性 分类代码 聚类 端到端时延 口袋 路由协议
在线阅读 下载PDF
LONG-TIME BEHAVIOR OF TRANSIENT SOLUTIONS FOR CELLULAR NEURAL NETWORK SYSTEMS
14
作者 蒋耀林 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2000年第3期321-326,共6页
By establishing concept an transient solutions of general nonlinear systems converging to its equilibrium set, long-time behavior of solutions for cellular neural network systems is studied. A stability condition in g... By establishing concept an transient solutions of general nonlinear systems converging to its equilibrium set, long-time behavior of solutions for cellular neural network systems is studied. A stability condition in generalized sense is obtained. This result reported has an important guide to concrete neural network designs. 展开更多
关键词 dynamic stability cellular neural network systems long-time behavior of transient solutions
在线阅读 下载PDF
Analog-Circuit Model of FGH96 Superalloy Hot Deformation Behaviors Based on Artificial Neural Network
15
作者 刘玉红 李付国 +1 位作者 李超 吴诗 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2005年第1期90-96,共7页
At the present time, numerical models (such as, numerical simulation based on FEM) adopted broadly in technological design and process control in forging field can not implement the realtime control of material form... At the present time, numerical models (such as, numerical simulation based on FEM) adopted broadly in technological design and process control in forging field can not implement the realtime control of material forming process. It is thus necessary to establish a dynamic model fitting for the real-time control of material deformation processing in order to increase production efficiency, improve forging qualities and increase yields. In this paper, hot deformation behaviors of FGH96 superalloy are characterized by using hot compressive simulation experiments. The artificial neural network (ANN) model of FGH96 superalloy during hot deformation is established by using back propagation (BP) network. Then according to electrical analogy theory, its analog-circuit (AC) model is obtained through mapping the ANN model into analog circuit. Testing results show that the ANN model and the AC model of FGH96 superalloy hot deformation behaviors possess high predictive precisions and can well describe the superalloy's dynamic flow behaviors. The ideas proposed in this paper can be applied in the real-time control of material deformation processing. 展开更多
关键词 FGH96 superalloy flow behavior artificial neural network(ANN) analog-circuit
在线阅读 下载PDF
考虑时序变化的动态网络异常行为识别方法
16
作者 隋芯 徐晓新 《计算机仿真》 2026年第2期444-448,共5页
为了能够及时发现并响应网络动态切换过程中的安全威胁,增强系统的防护能力,提出拟态防御下动态网络异常行为检测方法。基于拟态防御的动态异构冗余架构,采用图卷积神经网络提取网络节点间的局部邻域特征,通过池化层压缩图结构、保留关... 为了能够及时发现并响应网络动态切换过程中的安全威胁,增强系统的防护能力,提出拟态防御下动态网络异常行为检测方法。基于拟态防御的动态异构冗余架构,采用图卷积神经网络提取网络节点间的局部邻域特征,通过池化层压缩图结构、保留关键信息,最终经全连接层输出行为特征向量;结合长短期记忆神经网络分析提取的时间序列特征,利用其门控机制捕捉网络行为的时序变化,实现异常行为识别。实验结果表明,所提方法能够有效适应拟态防御下网络的动态性与异构性,提升网络异常检测的准确性,并有效降低资源消耗,为拟态防御体系中的轻量级异常检测提供了可行方案。 展开更多
关键词 拟态防御 动态网络 网络异常行为 图卷积神经网络 长短期记忆神经网络 异常检测
在线阅读 下载PDF
基于人工神经网络预测锂离子软包电池充放电行为研究
17
作者 刘宁 孙海波 《微纳电子技术》 2026年第1期94-103,共10页
基于人工神经网络(ANN)技术对钴酸锂/镍钴酸锂软包电池不同循环次数下的充放电曲线进行了预测,研究了隐含层数量、隐含层神经元个数、传递函数类型及优化算法对充放电曲线预测精度的调控作用。结果表明,采用单隐含层的ANN模型可实现充... 基于人工神经网络(ANN)技术对钴酸锂/镍钴酸锂软包电池不同循环次数下的充放电曲线进行了预测,研究了隐含层数量、隐含层神经元个数、传递函数类型及优化算法对充放电曲线预测精度的调控作用。结果表明,采用单隐含层的ANN模型可实现充放电曲线的高精度预测。预测充电行为时,最优的网络结构为2-47-1,隐含层和输出层传递函数分别为logsig和purelin,优化算法选用trainbr,预测值与实验值的均方误差(MSE)最低为2.43×10^(-7);预测放电行为时,最优的网络结构为2-69-1,隐含层与输出层传递函数分别为tansig和purelin,优化算法仍为trainbr,MSE最低为1.41×10^(-6)。基于电池1数据优化的模型可有效预测电池2的充放电行为,MSE稳定在10^(-5)数量级;当循环次数增至7000次时,MSE升至10^(-2)~10^(-3)数量级,这是由于模型未能充分表征电池老化过程中的电化学特征。此外,该ANN模型在训练、验证和测试数据集上的回归系数(R2)均超过0.99,展现出优异的预测精度与泛化能力。 展开更多
关键词 锂离子电池 软包电池 充放电曲线 人工神经网络(ANN) 电化学行为预测
原文传递
建筑企业数字化转型合作行为演化博弈研究
18
作者 李丽红 胡嵘嵘 吕峥昊 《沈阳建筑大学学报(社会科学版)》 2026年第1期36-43,共8页
在建筑企业数字化转型过程中,“数据孤岛”与资源匮乏等难题不断涌现,建筑企业间的合作成为突破转型瓶颈的重要途径。研究通过构建无标度网络演化博弈模型,对建筑企业数字化转型合作行为的影响因素进行研究,并用Matlab软件进行仿真。结... 在建筑企业数字化转型过程中,“数据孤岛”与资源匮乏等难题不断涌现,建筑企业间的合作成为突破转型瓶颈的重要途径。研究通过构建无标度网络演化博弈模型,对建筑企业数字化转型合作行为的影响因素进行研究,并用Matlab软件进行仿真。结果表明:合理的利益分配、较强的协同能力、适度的技术溢出效应、恰当的政策激励及适当的违约惩罚,能促进建筑企业数字化转型合作行为的产生。 展开更多
关键词 建筑企业 数字化转型 合作行为 无标度网络 演化博弈
在线阅读 下载PDF
社交网络下行为引导的多尺度双层群共识建模
19
作者 常文霞 张超 +2 位作者 李文涛 詹建明 李德玉 《计算机科学》 北大核心 2026年第4期180-187,共8页
作为智能化时代复杂决策的关键要素,群共识旨在通过观点交互缓解冲突,以达成一致意见。为弥补单尺度无法全面反映信息特征的不足,解决行为异质性及非公平性导致的冲突,在多尺度信息系统下构建社交网络行为引导的双层共识模型。首先,提... 作为智能化时代复杂决策的关键要素,群共识旨在通过观点交互缓解冲突,以达成一致意见。为弥补单尺度无法全面反映信息特征的不足,解决行为异质性及非公平性导致的冲突,在多尺度信息系统下构建社交网络行为引导的双层共识模型。首先,提出基于Choquet积分的尺度融合模型,采用模糊测度刻画尺度间的非线性交互作用,实现尺度间的深度耦合。其次,利用社交网络评估决策者行为,通过可靠性和传播力度量内在表现,利用互动密度和合作强度度量外在表现,为行为引导策略提供量化依据。然后,基于行为特征指标构建多粒度视角下的双层共识模型,结合优化模型与规则机制平衡意见调整的最小代价与最大公平,优化资源配置。此外,从基数和序数角度设计结合得分函数和序数排列的评分函数,突破传统评价单一维度局限。最后,利用携程平台上5A级晋祠景区的在线评论,对景区服务质量进行决策分析。 展开更多
关键词 多粒度 多尺度 群共识 社交网络 公平行为
在线阅读 下载PDF
Semi-Supervised Learning Based Big Data-Driven Anomaly Detection in Mobile Wireless Networks 被引量:6
20
作者 Bilal Hussain Qinghe Du Pinyi Ren 《China Communications》 SCIE CSCD 2018年第4期41-57,共17页
With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger amount of raw data(big data) that is generated at different lev... With rising capacity demand in mobile networks, the infrastructure is also becoming increasingly denser and complex. This results in collection of larger amount of raw data(big data) that is generated at different levels of network architecture and is typically underutilized. To unleash its full value, innovative machine learning algorithms need to be utilized in order to extract valuable insights which can be used for improving the overall network's performance. Additionally, a major challenge for network operators is to cope up with increasing number of complete(or partial) cell outages and to simultaneously reduce operational expenditure. This paper contributes towards the aforementioned problems by exploiting big data generated from the core network of 4 G LTE-A to detect network's anomalous behavior. We present a semi-supervised statistical-based anomaly detection technique to identify in time: first, unusually low user activity region depicting sleeping cell, which is a special case of cell outage; and second, unusually high user traffic area corresponding to a situation where special action such as additional resource allocation, fault avoidance solution etc. may be needed. Achieved results demonstrate that the proposed method can be used for timely and reliable anomaly detection in current and future cellular networks. 展开更多
关键词 5G 4G LTE-A anomaly detec-tion call detail record machine learning bigdata analytics network behavior analysis sleeping cell
在线阅读 下载PDF
上一页 1 2 192 下一页 到第
使用帮助 返回顶部