Detection of the Primary User's Behavior for the Intervention of the Secondary User Using Machine Learning

被引:3
作者
Zambrano Soto, Deisy Dayana [1 ]
Salcedo Parra, Octavio Jose [1 ,2 ]
Lopez Sarmiento, Danilo Alfonso [1 ]
机构
[1] Univ Distrital Francisco Jose de Caldas, Internet Res Grp, Fac Engn, Bogota, Colombia
[2] Univ Nacl Colombia, Fac Engn, Dept Syst & Ind Engn, Bogota, Colombia
来源
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018 | 2018年 / 11251卷
关键词
Cognitive Radio; KNN; LR; Machine learning; Primary users (PU); SVM;
D O I
10.1007/978-3-030-03192-3_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The predictive analysis for the spectral decision with automatic Learning is a task that is currently challenging. Some automatic Learning techniques are shown in order to predict the presence or absence of a primary user (PU) in Cognitive Radio. Four machine learning methods are examined including the K-nearest neighbors (KNN), the support vector machines (SVM), logistic regression (LR) and decision tree (DT) classifiers. These predictive models are built based on data and their performance is compared with the purpose of selecting the best classifier that can predict spectral occupancy.
引用
收藏
页码:200 / 213
页数:14
相关论文
共 50 条
[41]   Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User [J].
El Shafie, Ahmed ;
Sultan, Ahmed ;
Khattab, Tamer .
2014 12TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2014, :287-294
[42]   A widespread survey on machine learning techniques and user substantiation methods for credit card fraud detection [J].
Berkmans T.J. ;
Karthick S. .
International Journal of Business Intelligence and Data Mining, 2022, 22 (1-2) :223-247
[43]   Classifying Multilingual User Feedback using Traditional Machine Learning and Deep Learning [J].
Stanik, Christoph ;
Haering, Marlo ;
Maalej, Walid .
2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019), 2019, :220-226
[44]   Nonquiet Primary User Detection Scheme [J].
Song, Zhaoxia ;
Zhou, Zheng ;
Sun, Xuan ;
Ye, Yabin .
2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, :473-477
[45]   Implementation of Machine Learning Algorithm for Predicting User Behavior and Smart Energy Management [J].
Rajasekaran, Ramanan G. ;
Manikandaraj, S. ;
Kamaleshwar, R. .
2017 1ST IEEE INTERNATIONAL CONFERENCE ON DATA MANAGEMENT, ANALYTICS AND INNOVATION (ICDMAI), 2017, :24-30
[46]   Research and Mining of Intelligent Home User Behavior Pattern Based on Machine Learning [J].
Zhao Yan ;
Zhang Jinglu ;
Zhao Wanfang .
2018 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA), 2018, :131-134
[47]   User Behavior Analysis for Malware Detection [J].
Dumitrasc, Valentina ;
Serral-Gracia, Rene .
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 :92-110
[48]   Applying Machine Learning Techniques for Religious Extremism Detection on Online User Contents [J].
Mussiraliyeva, Shynar ;
Omarov, Batyrkhan ;
Yoo, Paul ;
Bolatbek, Milana .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01) :915-934
[49]   An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques [J].
Li, Yi ;
Xiong, Kaiqi ;
Li, Xiangyang .
PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, :529-534
[50]   Coexistence of Secondary User Networks under Primary User Constraints in TV White Space [J].
Sun, Chen ;
Villardi, Gabriel Porto ;
Lan, Zhou ;
Alemseged, Yohannes D. ;
Tran, Ha Nguyen ;
Harada, Hiroshi .
2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,