Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space

  • Amaury Lendasse
  • Atli B.
  • Buse Atli
  • Holtmanns S.
  • Kalliola A.
  • Lendasse A.
  • Miche Y.
  • Oliver I.

Recently, with the increased use of network communication, the risk of compromising the information has grown immensely. Intrusions have become more sophisticated and few methods can achieve efficient results while the network behavior constantly changes. This paper proposes an intrusion detection system based on modeling distributions of network statistics and ...

Computing minimum rainbow and strong rainbow colorings of block graphs

  • Keranen M.
  • Lauri J.

A path in an edge-colored graph G is rainbow if no two edges of it are colored the same. The graph G is rainbow-connected if there is a rainbow path between every pair of vertices. If there is a rainbow shortest path between every pair of vertices, the graph G ...

Predicting Outages in Radio Networks with Alarm Data

Modern cellular networks are complex systems offering a wide range of services and present challenges in detecting anomalous events when they do occur. The networks are engineered for high reliability and, hence, the data from these networks is predominantly normal with a small proportion being anomalous. From an operations perspective, ...

Minimizing the impact of prediction errors during anticipatory resource allocation

By predicting changes in service requirements and future evolution of network states, anticipatory networking aims at improving the performance of decision making and optimization algorithms. In this paper, we propose a reliability-aware scheduling model which exploits information of upcoming users' channel states to proactively optimize the resource allocation. Along with ...

On the MIMO Capacity with Multiple Linear Transmit Covariance Constraints

  • Claussen H.
  • Farrell R.
  • Flanagan M.
  • Pham T.
  • Tran L.

This paper presents an efficient approach to computing the capacity of multiple-input multiple-output (MIMO) channels under multiple linear transmit covariance constraints (LTCCs). LTCCs are general enough to include several special types of power constraints as special cases such as the sum power constraint (SPC), per-antenna power constraint (PAPC), or a ...

Pilot Allocation for Interference Coordination inTwo-tier Massive MIMO Heterogeneous Network

  • Gacanin H.
  • H. Furukawa
  • Hao W.
  • Muta O.
  • O. Muta
  • W. Hao

In this paper, we investigate pilot allocation problem in two-tier time division duplex (TDD) heterogeneous network (HetNet) with mMIMO. First, we propose a new pilot allocation scheme to maximize ergodic downlink sum rate of macro users (MUs) and small cell users (SUs), where the uplink pilot overhead and cross-tier interference ...

Energy Efficiency of Massive MIMO: Cell-Free vs Cellular

  • Marzetta T.
  • Yang H.

Cell-free Massive MIMO (Multiple Input Multiple Output) employs a large number of AP's (Access Points) that are distributed throughout the intended coverage area to simultaneously serve a much smaller number of user AT's (Access Terminals). Conjugate beamforming is the simplest precoding method for the downlink transmission, and allows decentralized precoding ...

Distributed Power Allocation for the Downlink of a Two-Cell MISO-NOMA System

  • Chen C.
  • Fu Y.
  • Lou Salaün
  • Sung C.

In this paper, we investigate the distributed power allocation algorithm for the downlink of a two-cell multiple input and single output non- orthogonal multiple access (MISO-NOMA) system. The problem targets at minimizing the total power consumption of the base stations (BSs) while taking into consideration each user's data rate requirement. ...

Optimization of Impulsive Noise Mitigation Scheme for PAPR Reduced OFDM Signals over Powerline Channels

  • Adebisi B.
  • Anoh K.
  • Gacanin H.
  • Rabie K.

The IEEE 1901 powerline standard can be deployed using orthogonal frequency division multiplexing (OFDM) since it is robust over impulsive channels. However, the powerline channel picks up impulsive interference that the conventional OFDM driver cannot combat. Since the probability density function (PDF) of OFDM amplitudes follow the Rayleigh distribution, it ...

Distributed Downlink Power Control for the MISO-NOMA System with Two Interfering Cells

  • Chen C.
  • Chi Wan Sung
  • Salaun L.
  • Yaru Fu

This paper investigates the power control problem for the downlink of a multiple-input single-output non-orthogonal multiple access (MISO-NOMA) system with two interfering cells. The problem aims at minimizing the total power of the base stations (BS) subject to the data rate requirements of the users. A distributed power control algorithm ...

Extreme Learning Machines for VISualization+R: Mastering Visualization with Target Variables

  • Akusok A.
  • Baek S.
  • Gritsenko A.
  • Lendasse A.
  • Miche Y.

© 2017, Springer Science+Business Media, LLC, part of Springer Nature. The current paper presents an improvement of the Extreme Learning Machines for VISualization (ELMVIS+) nonlinear dimensionality reduction method. In this improved method, called ELMVIS+R, it is proposed to apply the originally unsupervised ELMVIS+ method for the regression problems, using target ...

Corrections to: Smoothed online resource allocation in multi-tier distributed cloud networks (IEEE/ACM Transactions on Networking (2017) 25: 4 (2556-2570) DOI: 10.1109/TNET.2017.2707142)

  • Jiao L.
  • Jin Y.
  • Llorca J.
  • Sala A.
  • Tulino A.

© 1993-2012 IEEE. In [1], there are two symbol typos in equations. In (1b), the ' ? t, ? t ' should be ' ? i, ? t '. In (1d), the ' ? t, ? t ' should be ' ? j, ? t '. IEEE regrets the error.

Massive MIMO Unlicensed: A New Approach to Dynamic Spectrum Access

Nowadays, the demand for wireless mobile services is copious and will continue increasing in the near future. Mobile cellular operators are therefore looking at the unlicensed spectrum as an economical supplement to augment the capacity of their soon-to-be overloaded networks. The same unlicensed bands are luring Internet service providers, venue ...

Scaling factor optimization of turbo-polar iterative decoding

In this paper, we investigate the weighted iterative decoding to improve the performance of turbo-polar code. First of all, a minimum weighted mean square error criterion is proposed to optimize the scaling factors (SFs). Secondly, for two typical iterative algorithms, such as soft cancellation (SCAN) and belief propagation (BP) decoding, ...

DARN: Dynamic Baselines for Real-time Network Monitoring

  • Mijumbi R.

Network monitoring is necessary so as to ensure high reliability and availability in telecom networks. One of the main challenges posed by state-of-the-art monitoring tools is the creation of network baselines. Such baselines include thresholds that can be used to determine whether monitored values (with a given context, e.g. time) ...

FPGA-Centric Design Process for Avionic Simulation and Test

Real-time computing systems are increasingly used in aerospace and avionic industries. In the face of power challenge, performance requirements and demands for higher flexibility, hardware designers are directed toward reconfigurable computing using field programmable gate arrays (FPGAs) that offer high computation rates per watt and adaptability to the application constraints. ...

Energy-Per-Bit Performance Analysis of Relay-Assisted Power Line Communication Systems

This paper provides a comprehensive analysis of the energy efficiency performance for different relaying schemes over the non-Gaussian power line communication (PLC) channel. Specifically, amplify-and-forward (AF), decode-and-forward (DF), selective DF (SDF) and incremental DF (IDF) relaying systems are investigated. For a more realistic scenario, the power consumption profile of the ...

Antenna, PHY and MAC Design

  • Schaich F.
  • Wild T.

The Air Interface (AI) represents the complete Radio Access Network (RAN) protocol stack (i.e. PHY/MAC/RLC/PDCP/RRC layers or 5G equivalents) and all related functionalities describing the interaction between infrastructure and device and covering all services, bands, cell types etc. that are expected to characterize the overall 5G system. This chapter covers ...

Preemptive Scheduling of Latency Critical Traffic and its Impact on Mobile Broadband Performance

  • Pedersen K.
  • Pocovi G.
  • Steiner J.

In this paper, we present an exhaustive system level analysis of using preemptive scheduling for latency critical traffic in coexistence with mobile broadband for the 3GPP 5G New Radio. Enhanced recovery and HARQ retransmission mechanisms exploiting base station a priori knowledge of punctured radio resources from using preemptive scheduling are ...