Airborne Network Traffic Identification Method under Small Training Samples

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy Network Model for Part - of - SpeechTagging under Small Training

Recently, most of part-of-speech tagging approaches, such as rule-based, probabilistic, and neural network approaches, have shown very promising results. In this paper, we are particularly interested in probabilistic approaches, which usually require lots of training data to get reliable probabilities. We alleviate such restriction of probabilistic approaches by introducing a fuzzy network mode...

متن کامل

Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification

Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...

متن کامل

Virtual Private Network Design Under Traffic Uncertainty

We propose different formulations as well as efficient solution approaches for the VPN design problem under traffic uncertainty with symmetric bandwidths.

متن کامل

Evaluation of Small City Traffic Signal Network

IN T R O D U C T IO N Small cities have minor traffic congestion which occurs on major arterials. Primarily because of the importance of the central business district (C B D ), the greatest traffic delays result from the morning, noon and evening peak flows to, from and through the city center. In addition, the points within any size urban area of highest vehicle delay are at the signalized int...

متن کامل

Network Traffic Sampling Model on Packet Identification

Spatially coordinated packet sampling can be implemented by using a deterministic function of packet content to determine the selection decision for a given packet. In this way, a given packet may be selected at either all points that it passes, or none. Selection amongst the set of packets should appear as random as possible. In this paper we calculate the empirical entropy of selection of bit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University

سال: 2020

ISSN: 1000-2758,2609-7125

DOI: 10.1051/jnwpu/20203851129