Detection of the Primary User's Behavior for the Intervention of the Secondary User Using Machine Learning

被引:3
作者
Zambrano Soto, Deisy Dayana [1 ]
Salcedo Parra, Octavio Jose [1 ,2 ]
Lopez Sarmiento, Danilo Alfonso [1 ]
机构
[1] Univ Distrital Francisco Jose de Caldas, Internet Res Grp, Fac Engn, Bogota, Colombia
[2] Univ Nacl Colombia, Fac Engn, Dept Syst & Ind Engn, Bogota, Colombia
来源
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018 | 2018年 / 11251卷
关键词
Cognitive Radio; KNN; LR; Machine learning; Primary users (PU); SVM;
D O I
10.1007/978-3-030-03192-3_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The predictive analysis for the spectral decision with automatic Learning is a task that is currently challenging. Some automatic Learning techniques are shown in order to predict the presence or absence of a primary user (PU) in Cognitive Radio. Four machine learning methods are examined including the K-nearest neighbors (KNN), the support vector machines (SVM), logistic regression (LR) and decision tree (DT) classifiers. These predictive models are built based on data and their performance is compared with the purpose of selecting the best classifier that can predict spectral occupancy.
引用
收藏
页码:200 / 213
页数:14
相关论文
共 50 条
  • [11] Impact of secondary user communication on security communication of primary user
    Sibomana, Louis
    Hung Tran
    Quang Anh Tran
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4177 - 4190
  • [12] User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user
    Ranjan, Rohit
    Kumar, Shashi Shekhar
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (01):
  • [13] A User?s Guide to Machine Learning for Polymeric Biomaterials
    Meyer, Travis A.
    Ramirez, Cesar
    Tamasi, Matthew J.
    Gormley, Adam J.
    ACS POLYMERS AU, 2023, 3 (02): : 141 - 157
  • [14] Machine learning for user modeling
    Webb, GI
    Pazzani, MJ
    Billsus, D
    USER MODELING AND USER-ADAPTED INTERACTION, 2001, 11 (1-2) : 19 - 29
  • [15] Impact of the Primary User's Power Allocation on the Performance of the Secondary User in Cognitive Radio Networks
    Xu, Ding
    Feng, Zhiyong
    Zhang, Ping
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (02) : 668 - 672
  • [16] Machine Learning for User Modeling
    Geoffrey I. Webb
    Michael J. Pazzani
    Daniel Billsus
    User Modeling and User-Adapted Interaction, 2001, 11 : 19 - 29
  • [17] User Clustering for Rate Splitting using Machine Learning
    Pereira, Roberto
    Deshpande, Anay Ajit
    Vaca-Rubio, Cristian J.
    Mestre, Xavier
    Zanella, Andrea
    Gregoratti, David
    de Carvalho, Elisabeth
    Popovski, Petar
    2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 722 - 726
  • [18] A Method for Anomaly Detection of User Behaviors Based on Machine Learning
    TIAN Xin-guang 1
    2.Department of Electronic Engineering
    3.Research Institute of Beijing Capitel Group Corporation
    4.Institute of Computing Technology
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 61 - 65
  • [19] Identification of Twitter User Credibility Using Machine Learning
    Kurniati, Rizki
    Widyantoro, Dwi H.
    PROCEEDINGS OF 2017 5TH INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATIONS, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING (ICICI-BME): SCIENCE AND TECHNOLOGY FOR A BETTER LIFE, 2017, : 282 - 286
  • [20] BGP Dataset-Based Malicious User Activity Detection Using Machine Learning
    Park, Hansol
    Kim, Kookjin
    Shin, Dongil
    Shin, Dongkyoo
    INFORMATION, 2023, 14 (09)