This document discusses classifying network traffic flows into quality of service (QoS) classes using unsupervised machine learning and K-nearest neighbor clustering. It first reviews previous work in traffic classification. It then uses self-organizing maps and K-means clustering as unsupervised methods to identify three inherent traffic classes - transactional, bulk data transfer, and interactive applications. The K-nearest neighbor classifier is then evaluated and found to have a low error rate of around 2% for test data, significantly better than a minimum mean distance classifier with 7% error.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK
modulation technique provides better BER performance and bandwidth efficiency, due to its
code domain approach. The QCSK modulation technique provides double benefit: higher data
rate with similar BER performance and same bandwidth occupation as DCSK. By combining
the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos
shift keying (QCSK) scheme, a novel CS-QCSK modulation scheme called code shifted
Quadrature chaos shift keying is proposed. The noise performance of CS-QCSK is better to
most conventional modulation schemes and also provides an increased data transmission rates
with greatly improved robustness. Analytical expressions for the bit-error rates are derived for
both AWGN channel and Rayleigh multipath fading channel. The simulation result shows that
the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Eswar Publications
Recently machine learning has been introduced into the area of adaptive video streaming. This paper explores a novel taxonomy that includes six state of the art techniques of machine learning that have been applied to Dynamic Adaptive Streaming over HTTP (DASH): (1) Q-learning, (2) Reinforcement learning, (3) Regression, (4) Classification, (5) Decision Tree learning, and (6) Neural networks.
A Text-Independent Speaker Identification System based on The Zak TransformCSCJournals
A novel text-independent speaker identification system based on the Zak transform is implemented. The data used in this paper are drawn from the ELSDSR database. The efficiency of identification approaches 91.3% using single test file and 100% using two test files. The method shows comparable efficiency results with the well known MFCC method with an advantage of being faster in both modeling and identification.
Routing in Wireless Mesh Networks: Two Soft Computing Based Approachesijmnct
Due to dynamic network conditions, routing is the most critical part in WMNs and needs to be optimised.
The routing strategies developed for WMNs must be efficient to make it an operationally self configurable
network. Thus we need to resort to near shortest path evaluation. This lays down the requirement of some
soft computing approaches such that a near shortest path is available in an affordable computing time. This
paper proposes a Fuzzy Logic based integrated cost measure in terms of delay, throughput and jitter.
Based upon this distance (cost) between two adjacent nodes we evaluate minimal shortest path that updates
routing tables. We apply two recent soft computing approaches namely Big Bang Big Crunch (BB-BC) and
Biogeography Based Optimization (BBO) approaches to enumerate shortest or near short paths. BB-BC
theory is related with the evolution of the universe whereas BBO is inspired by dynamical equilibrium in
the number of species on an island. Both the algorithms have low computational time and high convergence
speed. Simulation results show that the proposed routing algorithms find the optimal shortest path taking
into account three most important parameters of network dynamics. It has been further observed that for
the shortest path problem BB-BC outperforms BBO in terms of speed and percent error between the
evaluated minimal path and the actual shortest path.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK
modulation technique provides better BER performance and bandwidth efficiency, due to its
code domain approach. The QCSK modulation technique provides double benefit: higher data
rate with similar BER performance and same bandwidth occupation as DCSK. By combining
the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos
shift keying (QCSK) scheme, a novel CS-QCSK modulation scheme called code shifted
Quadrature chaos shift keying is proposed. The noise performance of CS-QCSK is better to
most conventional modulation schemes and also provides an increased data transmission rates
with greatly improved robustness. Analytical expressions for the bit-error rates are derived for
both AWGN channel and Rayleigh multipath fading channel. The simulation result shows that
the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Eswar Publications
Recently machine learning has been introduced into the area of adaptive video streaming. This paper explores a novel taxonomy that includes six state of the art techniques of machine learning that have been applied to Dynamic Adaptive Streaming over HTTP (DASH): (1) Q-learning, (2) Reinforcement learning, (3) Regression, (4) Classification, (5) Decision Tree learning, and (6) Neural networks.
A Text-Independent Speaker Identification System based on The Zak TransformCSCJournals
A novel text-independent speaker identification system based on the Zak transform is implemented. The data used in this paper are drawn from the ELSDSR database. The efficiency of identification approaches 91.3% using single test file and 100% using two test files. The method shows comparable efficiency results with the well known MFCC method with an advantage of being faster in both modeling and identification.
Routing in Wireless Mesh Networks: Two Soft Computing Based Approachesijmnct
Due to dynamic network conditions, routing is the most critical part in WMNs and needs to be optimised.
The routing strategies developed for WMNs must be efficient to make it an operationally self configurable
network. Thus we need to resort to near shortest path evaluation. This lays down the requirement of some
soft computing approaches such that a near shortest path is available in an affordable computing time. This
paper proposes a Fuzzy Logic based integrated cost measure in terms of delay, throughput and jitter.
Based upon this distance (cost) between two adjacent nodes we evaluate minimal shortest path that updates
routing tables. We apply two recent soft computing approaches namely Big Bang Big Crunch (BB-BC) and
Biogeography Based Optimization (BBO) approaches to enumerate shortest or near short paths. BB-BC
theory is related with the evolution of the universe whereas BBO is inspired by dynamical equilibrium in
the number of species on an island. Both the algorithms have low computational time and high convergence
speed. Simulation results show that the proposed routing algorithms find the optimal shortest path taking
into account three most important parameters of network dynamics. It has been further observed that for
the shortest path problem BB-BC outperforms BBO in terms of speed and percent error between the
evaluated minimal path and the actual shortest path.
Sensitivity of Support Vector Machine Classification to Various Training Feat...Nooria Sukmaningtyas
Remote sensing image classification is one of the most important techniques in image
interpretation, which can be used for environmental monitoring, evaluation and prediction. Many algorithms
have been developed for image classification in the literature. Support vector machine (SVM) is a kind of
supervised classification that has been widely used recently. The classification accuracy produced by SVM
may show variation depending on the choice of training features. In this paper, SVM was used for land
cover classification using Quickbird images. Spectral and textural features were extracted for the
classification and the results were analyzed thoroughly. Results showed that the number of features
employed in SVM was not the more the better. Different features are suitable for different type of land
cover extraction. This study verifies the effectiveness and robustness of SVM in the classification of high
spatial resolution remote sensing images.
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...idescitation
Many network simulators (e.g., ns2) are already
being used for performing wired and wireless network
simulations. But, with the current graphical visualization
support in-built in ns2, it is difficult to understand the node
status, packet status and the MAC level events particularly
for Ad-hoc networks. In this paper, we extend the visualization
support in ns-2 that should help research community in the
area of wireless networks to analyze different MAC level
events in an efficient manner. In particular, we have developed
two types of visualizations namely, temporal and spatial.
Temporal visualization helps to analyze success or failure of
a packet with respect to time while spatial visualization helps
to understand the effects due to proximity of nodes. The trace
is made highly configurable in terms of different attributes
like specific nodes and time duration.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...csandit
Single-channel speech intelligibility enhancement is much more difficult than multi-channel
intelligibility enhancement. It has recently been reported that machine learning training-based
single-channel speech intelligibility enhancement algorithms perform better than traditional
algorithms. In this paper, the performance of a deep neural network method using a multiresolution
cochlea-gram feature set recently proposed to perform single-channel speech
intelligibility enhancement processing is evaluated. Various conditions such as different
speakers for training and testing as well as different noise conditions are tested. Simulations
and objective test results show that the method performs better than another deep neural
networks setup recently proposed for the same task, and leads to a more robust convergence
compared to a recently proposed Gaussian mixture model approach.
Semantic Image Retrieval Using Relevance Feedback dannyijwest
This paper presents optimized interactive content-based image retrieval framework based on AdaBoost
learning method. As we know relevance feedback (RF) is online process, so we have optimized the learning
process by considering the most positive image selection on each feedback iteration. To learn the system we
have used AdaBoost. The main significances of our system are to address the small training sample and to
reduce retrieval time. Experiments are conducted on 1000 semantic colour images from Corel database to
demonstrate the effectiveness of the proposed framework. These experiments employed large image
database and combined RCWFs and DT-CWT texture descriptors to represent content of the images.
Reconfiguration layers of convolutional neural network for fundus patches cla...journalBEEI
Convolutional neural network (CNN) is a method of supervised deep learning. The architectures including AlexNet, VGG16, VGG19, ResNet 50, ResNet101, GoogleNet, Inception-V3, Inception ResNet-V2, and Squeezenet that have 25 to 825 layers. This study aims to simplify layers of CNN architectures and increased accuracy for fundus patches classification. Fundus patches classify two categories: normal and neovascularization. Data used for classification is MESSIDOR and Retina Image Bank that have 2,080 patches. Results show the best accuracy of 93.17% for original data and 99,33% for augmentation data using CNN 31 layers. It consists input layer, 7 convolutional layers, 7 batch normalization, 7 rectified linear unit, 6 max-pooling, fully connected layer, softmax, and output layer.
Multi Object Tracking Methods Based on Particle Filter and HMMIJTET Journal
Abstract – For various application detection of objects movement in a video is an important process. Determination of path of object as time advances is a tedious step. Many proposal for tracking the multiple movement of object has been put forward using various sophisticated techniques. In this paper detail description of the recent object trackers based on particle filtering and Markov Models have been analyzed. The outcome of the analysis is computational efficiency, robustness and computational complexity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
We propose an algorithm for training Multi Layer Preceptrons for classification problems, that we named Hidden Layer Learning Vector Quantization (H-LVQ). It consists of applying Learning Vector Quantization to the last hidden layer of a MLP and it gave very successful results on problems containing a large number of correlated inputs. It was applied with excellent results on classification of Rurtherford
backscattering spectra and on a benchmark problem of image recognition. It may also be used for efficient feature extraction.
Part B, ML in/for Wireless LANs.
Contents: Basics of ML, Applications of ML for Wireless Networks, and Techniques to train ML model in Wireless Networks.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
Sensitivity of Support Vector Machine Classification to Various Training Feat...Nooria Sukmaningtyas
Remote sensing image classification is one of the most important techniques in image
interpretation, which can be used for environmental monitoring, evaluation and prediction. Many algorithms
have been developed for image classification in the literature. Support vector machine (SVM) is a kind of
supervised classification that has been widely used recently. The classification accuracy produced by SVM
may show variation depending on the choice of training features. In this paper, SVM was used for land
cover classification using Quickbird images. Spectral and textural features were extracted for the
classification and the results were analyzed thoroughly. Results showed that the number of features
employed in SVM was not the more the better. Different features are suitable for different type of land
cover extraction. This study verifies the effectiveness and robustness of SVM in the classification of high
spatial resolution remote sensing images.
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...idescitation
Many network simulators (e.g., ns2) are already
being used for performing wired and wireless network
simulations. But, with the current graphical visualization
support in-built in ns2, it is difficult to understand the node
status, packet status and the MAC level events particularly
for Ad-hoc networks. In this paper, we extend the visualization
support in ns-2 that should help research community in the
area of wireless networks to analyze different MAC level
events in an efficient manner. In particular, we have developed
two types of visualizations namely, temporal and spatial.
Temporal visualization helps to analyze success or failure of
a packet with respect to time while spatial visualization helps
to understand the effects due to proximity of nodes. The trace
is made highly configurable in terms of different attributes
like specific nodes and time duration.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Objective Evaluation of a Deep Neural Network Approach for Single-Channel Spe...csandit
Single-channel speech intelligibility enhancement is much more difficult than multi-channel
intelligibility enhancement. It has recently been reported that machine learning training-based
single-channel speech intelligibility enhancement algorithms perform better than traditional
algorithms. In this paper, the performance of a deep neural network method using a multiresolution
cochlea-gram feature set recently proposed to perform single-channel speech
intelligibility enhancement processing is evaluated. Various conditions such as different
speakers for training and testing as well as different noise conditions are tested. Simulations
and objective test results show that the method performs better than another deep neural
networks setup recently proposed for the same task, and leads to a more robust convergence
compared to a recently proposed Gaussian mixture model approach.
Semantic Image Retrieval Using Relevance Feedback dannyijwest
This paper presents optimized interactive content-based image retrieval framework based on AdaBoost
learning method. As we know relevance feedback (RF) is online process, so we have optimized the learning
process by considering the most positive image selection on each feedback iteration. To learn the system we
have used AdaBoost. The main significances of our system are to address the small training sample and to
reduce retrieval time. Experiments are conducted on 1000 semantic colour images from Corel database to
demonstrate the effectiveness of the proposed framework. These experiments employed large image
database and combined RCWFs and DT-CWT texture descriptors to represent content of the images.
Reconfiguration layers of convolutional neural network for fundus patches cla...journalBEEI
Convolutional neural network (CNN) is a method of supervised deep learning. The architectures including AlexNet, VGG16, VGG19, ResNet 50, ResNet101, GoogleNet, Inception-V3, Inception ResNet-V2, and Squeezenet that have 25 to 825 layers. This study aims to simplify layers of CNN architectures and increased accuracy for fundus patches classification. Fundus patches classify two categories: normal and neovascularization. Data used for classification is MESSIDOR and Retina Image Bank that have 2,080 patches. Results show the best accuracy of 93.17% for original data and 99,33% for augmentation data using CNN 31 layers. It consists input layer, 7 convolutional layers, 7 batch normalization, 7 rectified linear unit, 6 max-pooling, fully connected layer, softmax, and output layer.
Multi Object Tracking Methods Based on Particle Filter and HMMIJTET Journal
Abstract – For various application detection of objects movement in a video is an important process. Determination of path of object as time advances is a tedious step. Many proposal for tracking the multiple movement of object has been put forward using various sophisticated techniques. In this paper detail description of the recent object trackers based on particle filtering and Markov Models have been analyzed. The outcome of the analysis is computational efficiency, robustness and computational complexity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
We propose an algorithm for training Multi Layer Preceptrons for classification problems, that we named Hidden Layer Learning Vector Quantization (H-LVQ). It consists of applying Learning Vector Quantization to the last hidden layer of a MLP and it gave very successful results on problems containing a large number of correlated inputs. It was applied with excellent results on classification of Rurtherford
backscattering spectra and on a benchmark problem of image recognition. It may also be used for efficient feature extraction.
Part B, ML in/for Wireless LANs.
Contents: Basics of ML, Applications of ML for Wireless Networks, and Techniques to train ML model in Wireless Networks.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
Competent scene classification using feature fusion of pre-trained convolutio...TELKOMNIKA JOURNAL
In view of the fact that the development of convolutional neural networks (CNN) and other deep learning techniques, scientists have become more interested in the scene categorization of remotely acquired images as well as other algorithms and datasets. The spatial geometric detail information may be lost as the convolution layer thickness increases, which would have a significant impact on the classification accuracy. Fusion-based techniques, which are regarded to be a viable way to express scene features, have recently attracted a lot of interest as a solution to this issue. Here, we suggested a convolutional feature fusion network that makes use of canonical correlation, which is the linear correlation between two feature maps. Then, to improve scene classification accuracy, the deep features extracted from various pre-trained convolutional neural networks are efficiently fused. We thoroughly evaluated three different fused CNN designs to achieve the best results. Finally, we used the support vector machine for categorization (SVM). In the analysis, two real-world datasets UC Merced and SIRI-WHU were employed, and the competitiveness of the investigated technique was evaluated. The improved categorization accuracy demonstrates that the fusion technique under consideration has produced affirmative results when compared to individual networks.
CSC 347 – Computer Hardware and MaintenanceSumaiya Ismail
This is report format on CSC 347 – Computer Hardware and Maintenance. It is for IUBAT university but as per I assume every University can use this format.
Influence of priors over multityped object in evolutionary clusteringcsandit
In recent years, Evolutionary clustering is an evolving research area in data mining. The
evolution diagnosis of any homogeneous as well as heterogeneous network will provide an
overall view about the network. Applications of evolutionary clustering includes, analyzing, the
social networks, information networks, about their structure, properties and behaviors. In this
paper, the authors study the problem of influence of priors over multi-typed object in
evolutionary clustering. Priors are defined for each type of object in a heterogeneous
information network and experimental results were produced to show how consistency and
quality of cluster changes according to the priors.
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGcscpconf
In recent years, Evolutionary clustering is an evolving research area in data mining. The evolution diagnosis of any homogeneous as well as heterogeneous network will provide an overall view about the network. Applications of evolutionary clustering includes, analyzing, the social networks, information networks, about their structure, properties and behaviors. In this paper, the authors study the problem of influence of priors over multi-typed object in
evolutionary clustering. Priors are defined for each type of object in a heterogeneous information network and experimental results were produced to show how consistency and quality of cluster changes according to the priors
COMPARATIVE PERFORMANCE ANALYSIS OF RNSC AND MCL ALGORITHMS ON POWER-LAW DIST...acijjournal
Cluster analysis of graph related problems is an important issue now-a-day. Different types of graph
clustering techniques are appeared in the field but most of them are vulnerable in terms of effectiveness
and fragmentation of output in case of real-world applications in diverse systems. In this paper, we will
provide a comparative behavioural analysis of RNSC (Restricted Neighbourhood Search Clustering) and
MCL (Markov Clustering) algorithms on Power-Law Distribution graphs. RNSC is a graph clustering
technique using stochastic local search. RNSC algorithm tries to achieve optimal cost clustering by
assigning some cost functions to the set of clusterings of a graph. This algorithm was implemented by A.
D. King only for undirected and unweighted random graphs. Another popular graph clustering
algorithm MCL is based on stochastic flow simulation model for weighted graphs. There are plentiful
applications of power-law or scale-free graphs in nature and society. Scale-free topology is stochastic i.e.
nodes are connected in a random manner. Complex network topologies like World Wide Web, the web of
human sexual contacts, or the chemical network of a cell etc., are basically following power-law
distribution to represent different real-life systems. This paper uses real large-scale power-law
distribution graphs to conduct the performance analysis of RNSC behaviour compared with Markov
clustering (MCL) algorithm. Extensive experimental results on several synthetic and real power-law
distribution datasets reveal the effectiveness of our approach to comparative performance measure of
these algorithms on the basis of cost of clustering, cluster size, modularity index of clustering results and
normalized mutual information (NMI).
Novel text categorization by amalgamation of augmented k nearest neighbourhoo...ijcsity
Machine learning for text classification is the
underpinning
of document
cataloging
, news filtering,
document
steering
and
exemplif
ication
. In text mining realm, effective feature selection is significant to
make the learning task more accurate and competent. One of the
traditional
lazy
text classifier
k
-
Nearest
Neighborhood (
k
NN) has
a
major pitfall in calculating the similarity between
all
the
objects in training and
testing se
t
s,
there by leads to exaggeration of
both
computational complexity
of the algorithm
and
massive
consumption
of
main memory
. To diminish these shortcomings
in
viewpoint
of a
data
-
mining
practitioner
a
n
amalgamati
ve technique is proposed in this paper using
a novel restructured version of
k
NN called
Augmented
k
NN
(AkNN)
and
k
-
Medoids
(kMdd)
clustering.
The proposed work
comprises
preprocesses
on
the
initial training
set
by
imposing
attribute feature selection
for reduc
tion of high dimensionality, also it
detects and excludes the high
-
fliers
samples
in t
he
initial
training set
and
re
structure
s
a
constricted
training
set
.
The kMdd clustering algorithm generates the cluster centers (as interior objects) for each category
and
restructures
the constricted training set
with centroids
. This technique
is
amalgamated with
AkNN
classifier
that
was prearranged with
text mining similarity measure
s.
Eventually, s
ignifican
tweights
and ranks were
assigned to each object in the new
training set based upon the
ir
accessory towards the
object in testing set
.
Experiments
conducted
on Reuters
-
21578 a
UCI benchmark
text mining
data
set
, and
comparisons with
traditional
k
NN
classifier designates
the
referred
method
yield
spreeminentrecital
in b
oth clustering and
classification
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...ijsrd.com
Moving Object Databases (MOD), although ubiquitous, still call for methods that will be able to understand, search, analyze, and browse their spatiotemporal content. In this paper, we propose a method for trajectory segmentation and sampling based on the representativeness of the (sub) trajectories in the MOD. In order to find the most representative sub trajectories, the following methodology is proposed. First, a novel global voting algorithm is performed, based on local density and trajectory similarity information. This method is applied for each segment of the trajectory, forming a local trajectory descriptor that represents line segment representativeness. The sequence of this descriptor over a trajectory gives the voting signal of the trajectory, where high values correspond to the most representative parts. Then, a novel segmentation algorithm is applied on this signal that automatically estimates the number of partitions and the partition borders, identifying homogenous partitions concerning their representativeness. Finally, a sampling method over the resulting segments yields the most representative sub trajectories in the MOD. Our experimental results in synthetic and real MOD verify the effectiveness of the proposed scheme, also in comparison with other sampling techniques.
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
Wireless mesh networking has transpired as a gifted technology for potential broadband wireless access. In a communication network, wireless mesh network plays a vital role in transmission and are structured in a mesh topology. The coordination of mesh routers and mesh clients forms the wireless mesh networks which are routed through the gateways. Wireless mesh networks uses IEEE 802.11 standards and has its wide applications broadband home networking and enterprise networking deployment such as Microsoft wireless mesh and MIT etc. A professional Qos provisioning in intra cluster packet level resource allocation for WMN approach takes power allocation, sub carrier allocation and packet scheduling. This approach combines the merits of a Karush-Kuhn-Tucker (KKT) algorithm and a genetic algorithm (GA) based approach. The KKT algorithm uses uniform power allocation over all the subcarriers, based on the optimal allocation criterion. The genetic algorithm is used to generate useful solutions to optimization and search problems and it is also used for search problems. By combining the intrinsic worth of both the approaches, it facilitates effective QOS provisioning at the packet level. It is concluded that, this approach achieves a preferred stability between system implementation and computational convolution.
Performance analysis of congestion-aware Q-routing algorithm for network on chipIAESIJAI
A network on chip’s performance is greatly impacted by network congestion due to the substantial increase in latency and energy utilized. Designing routing strategies that keep the network informed of the status of traffic is made easier by machine learning techniques. In this work, a reinforcement-based congestion-aware Q-routing (CAQR) technique has been presented. The proposed algorithm performed better in comparison to the conventional XY routing method tested against the SPEC CPU2006 benchmark suite in the gem5 NoC simulator tool. The suite used has 4 benchmarks, namely, namd, lbm, leslie3d and bzip2 which can be used for the cores in the network in any combination. The tests were run with 16 cores on a 4×4 network with the maximum instruction count supported by the system (here 5,000). The proposed Q-routing algorithm showed an average of 19% reduction for benchmark simulation as compared to the Dimension-ordered (X-Y) routing for readings of average packet latency which is a crucial factor in determining a network’s efficiency. The analysis also shows an average reduction of 24%, 10%, 23% and 47% in terms of average packet network latency, average flit latency, average flit network latency and average energy consumption across various benchmarks.
Image Segmentation Using Two Weighted Variable Fuzzy K MeansEditor IJCATR
Image segmentation is the first step in image analysis and pattern recognition. Image segmentation is the process of dividing an image into different regions such that each region is homogeneous. The accurate and effective algorithm for segmenting image is very useful in many fields, especially in medical image. This paper presents a new approach for image segmentation by applying k-means algorithm with two level variable weighting. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means and Fuzzy k-means clustering algorithm is one of the most widely used algorithms in the literature, and many authors successfully compare their new proposal with the results achieved by the k-Means and Fuzzy k-Means. This paper proposes a new clustering algorithm called TW-fuzzy k-means, an automated two-level variable weighting clustering algorithm for segmenting object. In this algorithm, a variable weight is also assigned to each variable on the current partition of data. This could be applied on general images and/or specific images (i.e., medical and microscopic images). The proposed TW-Fuzzy k-means algorithm in terms of providing a better segmentation performance for various type of images. Based on the results obtained, the proposed algorithm gives better visual quality as compared to several other clustering methods.
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...ijcsit
In this paper, we present an algorithm for feature selection. This algorithm labeled QC-FS: Quantum
Clustering for Feature Selection performs the selection in two steps. Partitioning the original features
space in order to group similar features is performed using the Quantum Clustering algorithm. Then the
selection of a representative for each cluster is carried out. It uses similarity measures such as correlation
coefficient (CC) and the mutual information (MI). The feature which maximizes this information is chosen
by the algorithm
Comparision of methods for combination of multiple classifiers that predict b...IJERA Editor
Predictive analysis include techniques fromdata mining that analyze current and historical data and make
predictions about the future. Predictive analytics is used in actuarial science, financial services, retail, travel,
healthcare, insurance, pharmaceuticals, marketing, telecommunications and other fields.Predicting patterns can
be considered as a classification problem and combining the different classifiers gives better results. We will
study and compare three methods used to combine multiple classifiers. Bayesian networks perform
classification based on conditional probability. It is ineffective and easy to interpret as it assumes that the
predictors are independent. Tree augmented naïve Bayes (TAN) constructs a maximum weighted spanning tree
that maximizes the likelihood of the training data, to perform classification.This tree structure eliminates the
independent attribute assumption of naïve Bayesian networks. Behavior-knowledge space method works in two
phases and can provide very good performances if large and representative data sets are available.
This paper proposes a clustering algorithm based on the Self Organizing Map (SOM) method. To find the optimal number of clusters, our algorithm uses the Davies Bouldin index which has not been used previously in the multi-SOM. The proposed algorithm is compared to three clustering methods based on five databases. Results show that our algorithm is as performing as concurrent methods.
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks IJCSES Journal
In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks
(MANETs) is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can
operate without using focal access points, pre-existing infrastructures, or a centralized management point.
In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead
to various problems in the routing process such as increase of the overhead massages and inefficient
routing between nodes of network. A large variety of clustering methods have been developed for
establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having
significant impact on MANETs performance. The K-means algorithm is one of the effective clustering
methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption.
This paper proposed a new K-means clustering algorithm to find out optimal path from source node to
destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means
clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed
cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the
performance of routing process in Mobile ad-hoc networks.
1. KSII The first International Conference on Internet (ICONI) 2009, December 2009
1
Copyright ⓒ 2009 KSII
Classification of Traffic Flows into QoS
Classes by Unsupervised Learning and
KNN Clustering
Yi Zeng1 and Thomas M. Chen2
1
San Diego Supercomputer Center, University of California
San Diego, CA 92093 - USA
[e-mail: yzeng@sdsc.edu]
2
School of Engineering, Swansea University
Swansea, Wales SA2 8PP - UK
[e-mail: t.m.chen@swansea.ac.uk]
*Corresponding author: Thomas M. Chen
Abstract
Traffic classification seeks to assign packet flows to an appropriate quality of service (QoS) class
based on flow statistics without the need to examine packet payloads. Classification proceeds in two
steps. Classification rules are first built by analyzing traffic traces, and then the classification rules are
evaluated using test data. In this paper, we use self-organizing map and K-means clustering as
unsupervised machine learning methods to identify the inherent classes in traffic traces. Three clusters
were discovered, corresponding to transactional, bulk data transfer, and interactive applications. The
K-nearest neighbor classifier was found to be highly accurate for the traffic data and significantly
better compared to a minimum mean distance classifier.
Keywords: Traffic classification, unsupervised learning, k-nearest neighbor, clustering
1. Introduction the network to processing only the IP packet
header.
Network operators and system administrators
In Section 2, we review the previous work in
are interested in the mixture of traffic carried in
traffic classification. Section 3 addresses the
their networks for several reasons. Knowledge
question of useful features and number of QoS
about traffic composition is valuable for
classes. We describe experiments with
network planning, accounting, security, and
unsupervised clustering of real traffic traces to
traffic control. Traffic control includes packet
build classification rules. Given the discovered
scheduling and intelligent buffer management to
QoS classes, Section 4 presents experimental
provide the quality of service (QoS) needed by
evaluation of classification accuracy using k-
applications. It is necessary to determine to
nearest neighbor compared to minimum mean
which applications packets belong, but
distance clustering.
traditional protocol layering principles restrict
This research was supported by a research grant from the IT R&D program of MKE/IITA, the Korean
government [2005-Y-001-04, Development of Next Generation Security Technology]. We express our thanks to
Dr. Richard Berke who checked our manuscript.
2. 2 Zeng et al.: Classification of Traffic Flows into QoS Classes by Clustering
input vector is called the best-matching unit
(BMU), denoted by mc :
2. Related Work x m= i x m
−c m −i
n (1)
i
Research in traffic classification, which avoids where ⋅ is the Euclidean distance, and { i} m
payload inspection, has accelerated over the last are the codebook vectors.
five years. It is generally difficult to compare After finding BMU, the SOM codebook
different approaches, because they vary in the vectors are updated, such that the BMU is
selection of features (some requiring inspection moved closer to the input vector. The
of the packet payload), choice of supervised or topological neighbors of BMU are also treated
unsupervised classification algorithms, and set this way. This procedure moves BMU and its
of classified traffic classes. The wide range of topological neighbors towards the sample
previous approaches can be seen in the vectors. The update rule for the ith codebook
comprehensive survey by Nguyen and Armitage vector is:
[1]. Further complicating comparisons between mi (n + 1) = mi (n) + α r (n)hci (2)
different studies is the fact that classification where n is the training iteration number, x(t) is
performance depends on how the classifier is an input vector randomly selected from the
trained and the test data used to evaluate
input data set at the nth training, α (n is the
r )
accuracy. Unfortunately, a universal set of test
traffic data does not exist to allow uniform learning rate in the nth training, and hi(n is
c )
comparisons of different classifiers. the kernel function around BMU mc . The
A common approach is to classify traffic on kernel function defines the region of influence
the basis of flows instead of individual packets. that x has on the map.
Trussell et al. proposed the distribution of Fig. 1 shows the U-matrix and the
packet lengths as a useful feature [2]. McGregor components planes for the feature variables. The
et al. used a variety of features: packet length U-matrix is a visualization of distance between
statistics, interarrival times, byte counts, neurons, where distance is color coded
connection duration [3]. Flows with similar according to the spectrum shown next to the
features were grouped together using EM map. Blue areas represent codebook vectors
(expectation- maximization) clustering. Having close to each other in input space, i.e., clusters.
found the clusters representing a set of traffic
classes, the features contributing little were
deleted to simplify classification and the
clusters were recomputed with the reduced
feature set. EM clustering was also studied by
Zander, Nguyen, and Armitage [4]. Sequential
forward selection (SFS) was used to reduce the
feature set. The same authors also tried
AutoClass, an unsupervised Bayesian classifier,
for cluster formation and SFS for feature set
reduction [5].
3. Unsupervised Clustering
Fig. 1. U-matrix with 7 components scaled to
3.1 Self-Organizing Map
[0,1].
SOM is trained iteratively. In each training step,
one sample vector x from the input data pool is 3.2 K-Means Clustering
chosen randomly, and the distances between it The K-means clustering algorithm starts with a
and all the SOM codebook vectors are training data set and a given number of clusters
calculated using some distance measure. The K. The samples in the training data set are
neuron whose codebook vector is closest to the assigned to a cluster based on a similarity
3. KSII The first International Conference on Internet (ICONI) 2009, December 2009
3
measurement. Euclidean distance is generally 5. Conclusions
used to measure the similarity. The K-means
algorithm tries to find an optimal solution by Traffic classification was carried out in two
minimizing the square error: phases. In the first off-line phase, we started
K n with no assumptions about traffic classes and
∑ x −c
∑
2
Er= j i (3) used the unsupervised SOM and K-means
i= j=
1 1 clustering algorithms to find the structure in the
where K is the number of clusters and n is the traffic data. The data exploration procedure
found three clusters corresponding to three QoS
number of training samples, c i is the center of
classes: transactional, interactive, and bulk data
the ith cluster, x−c is the Euclidean distance
i transfer.
between sample x and center c i of the ith In the second classification phase, the
cluster. accuracy of the KNN classifier was evaluated
for test data. Leave-one-out cross-validation
tests showed that this algorithm had a low error
4. Experimental Classification rate. The KNN classifier was found to have an
Results and Analysis error rate of about 2 percent for the test data,
compared to an error rate of 7 percent for a
The previous section identified three clusters for MMD classifier. KNN is one of the simplest
QoS classes and features to build up classification algorithms, but not necessarily the
classification rules through unsupervised most accurate. Other supervised algorithms,
learning. In this section, the accuracy of the such as back propagation (BP) and SVM, also
classification rules is evaluated experimentally. have attractive features and should be compared
For classification, we chose the K-nearest in future work.
neighbor (KNN) algorithm. Experimental
results are compared with the minimum mean
distance (MMD) classifier. References
The selected application lists for each class
and the number of applications in each class are [1] Thuy Nguyen and Grenville Armitage, “A
shown in Table 1. survey of techniques for Internet traffic
classification using machine learning,”
Table 1. Applications in each class IEEE Communications Surveys and
Class Applications Total Tutorials, vo.10, no.4, pp.56-76, 2008.
number [2] H. Trussell, A. Nilsson, P. Patel, and Y.
Wang, “Estimation and detection of
53/TCP, 13/TCP,
Transactional 112 network traffic,” in Proc. of 11th Digital
111/TCP,…
Signal Processing Workshop, pp.246-248,
23/TCP, 21/TCP,
2004.
43/TCP,
[3] Anthony McGregor, Mark Hall, Perry
513/TCP,
Lorier, and James Brunskill, “Flow
514/TCP,
clustering using machine learning
Interactive 540/TCP, 77
techniques,” in Proc. of 5th Int. Workshop
251/TCP,
on Passive and Active Network
1017/TCP, 1019/
Measurement, pp.205-214, 2004.
TCP, 1020/TCP,
[4] Sebastian Zander, Thuy Nguyen, and
1022/TCP,…
Grenville Armitage, “Self-learning IP
80/TCP, 20/TCP,
traffic classification based on statistical
25/TCP, 70/TCP,
flow characteristics,” in Proc. of 6th Int.
79/TCP, 81/TCP,
Workshop on Passive and Active
82/TCP, 83/TCP,
Bulk data 1351 Measurement, pp.325-328, 2005.
84/TCP,
[5] Sebastian Zander, Thuy Nguyen, and
119/TCP,
Grenville Armitage, “Automated traffic
210/TCP,
classification and application identification
8080/TCP,…
using machine learning,” in Proc. of IEEE
4. 4 Zeng et al.: Classification of Traffic Flows into QoS Classes by Clustering
Conf. on Local Computer Networks,
pp.250-257, 2005.