Computer Science ›› 2020, Vol. 47 ›› Issue (8): 319-322.doi: 10.11896/jsjkx.190800075

Previous Articles     Next Articles

Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine

CAO Su-e, YANG Ze-min   

  1. School of Computer and Network Engineering, Shanxi Datong University, Datong, Shanxi 037009, China
  • Online:2020-08-15 Published:2020-08-10
  • About author:CAO Su-e, born in 1976, master, experimenter.Her main research interests include data processing and data mining.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (11871314) and National Natural Science Youth Foundation of China (11605107).

Abstract: In order to solve the problems existing in the current wireless network traffic prediction process and improve the accuracy of wireless network traffic prediction, a wireless network traffic prediction model based on clustering analysis algorithm and optimized support vector machine is proposed.Firstly, data sets of wireless network traffic are collected and clustering analysis algorithm is used to construct the training sample set.And then, support vector machine is used to learn the training samples of wireless network traffic, and cuckoo search algorithms is introduced to optimize the parameters of support vector.Thus, the prediction model of wireless network traffic is established.Finally, the effectiveness of the model is analyzed through a specific example of wireless network traffic prediction.The results show that the proposed model has high prediction accuracy, improves the efficiency of wireless network traffic modeling, and the prediction effect of wireless network traffic is better than the current classical wireless network traffic prediction models, which has more significant advantages.

Key words: Clustering analysis algorithm, Cuckoo search algorithms, Support vector machine, Traffic prediction, Wireless network

CLC Number: 

  • TP391
[1]CINIC.The 41st China statistical report on Internet development [R].Beijing:China Internet Network Information Center, 2018.
[2]VELAN P, CERMAK M, CELEDA P, et al.A survey of methods for encrypted traffic classification and analysis[J].International Journal of Network Management, 2015, 25(5):355-374.
[3]DU Z, MA L P, SUN G Z.Network Traffic Anomaly Detection Based on Wavelet Analysis [J].Computer Science, 2019, 46(8):178-182.
[4]GUO J, YU Y B, YANG C Y.Multi-step network traffic prediction based on full attention mechanism [J].Signal Processing, 2019, 35(5):758-767.
[5]CHEN X, TANG J Y.Internet of Things traffic prediction mo-del based on Bayesian and causal ridge regression [J].Journal of Sichuan University (Natural Science Edition), 2018, 55 (5):965-970.
[6]GUO F, CHEN L, YANG Z W.Real-time traffic prediction of large-scale IP backbone network based on MGU [J].Journal of Shandong University (Engineering Science), 2019, 49(2):88-95.
[7]ACETO G, CIUONZO D, MONTIERI A, et al.Mobile encrypted traffic classification using deep learning[C]∥2018 Network Traffic Measurement and Analysis Conference (TMA).IEEE, 2018:1-8.
[8]GE S C, LIU X F, ZHOU F.Train information transmission network traffic modeling and prediction of CRH2 EMU [J].Computer Science, 2017, 44(10):91-95, 126.
[9]LI R, ZHAO Z, ZHENG J, et al.The learning and prediction of application-level traffic data in cellular networks [J].IEEE Transactions on Wireless Communications, 2017, 16(6):3899-3912.
[10]LIN Z D, LV H H.Network traffic prediction mechanism based on wavelet coefficient perception [J].Journal of Terahertz Science and Electronic Information Technology, 2019, 17(1):131-135.
[11]LIU Y, LI W, LI Y C.Network traffic classification using k-means clustering[C]∥International Multi-symposiums on Computer & Computational Sciences.2007.
[12]CHEN Z, LIU Z, PENG L, et al.A novel semi-supervised lear-ning method for Internet application identification [J].Soft Computing, 2017, 21(8):1963-1975.
[13]LOTFOLLAHI M, SIAVOSHANI M J, ZADE R S H, et al.Deep packet:A novel approach for encrypted traffic classification using deep learning [J].Soft Computing, 2017, 28(9):1-14.
[14]LI Y Q, H Y, SUN X C.Network traffic prediction model based on deep confidence echo state network [J].Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2018, 38(5):85-90.
[15]WANG K.Research on network traffic prediction based oncloud computing and extreme learning machine [J].Journal of Shandong Agricultural University (Natural Science Edition), 2018, 49(4):632-635.
[16]LIU K.Chaotic prediction of network traffic based on particle swarm optimization support vector machine [J].Modern Electronics Technique, 2019, 42(2):120-123.
[17]ZHANG C, PAUL P.Long-term mobile traffic forecasting using deep spatio-temporal neural networks[C]∥Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing.Angeles:ACM, 2018:231-240.
[18]NAREJO S, PASERO E.An Application of Internet Traffic Prediction with Deep Neural Network [J].Multidisciplinary Approaches to Neural Computing, 2018, 69(1):139-149.
[1] SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216.
[2] CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300.
[3] HOU Xia-ye, CHEN Hai-yan, ZHANG Bing, YUAN Li-gang, JIA Yi-zhen. Active Metric Learning Based on Support Vector Machines [J]. Computer Science, 2022, 49(6A): 113-118.
[4] XING Yun-bing, LONG Guang-yu, HU Chun-yu, HU Li-sha. Human Activity Recognition Method Based on Class Increment SVM [J]. Computer Science, 2022, 49(5): 78-83.
[5] GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328.
[6] ZHAO Luo-cheng, QU Zhi-hao, XIE Zai-peng. Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment [J]. Computer Science, 2022, 49(3): 39-45.
[7] GUO Fu-min, ZHANG Hua, HU Rong-hua, SONG Yan. Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals [J]. Computer Science, 2021, 48(6A): 317-320.
[8] HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373.
[9] SONG Yuan-long, LYU Guang-hong, WANG Gui-zhi, JIA Wu-cai. SDN Traffic Prediction Based on Graph Convolutional Network [J]. Computer Science, 2021, 48(6A): 392-397.
[10] PENG Da-chuan, YANG Xi-min, TANG Wan, ZHANG Xiao, FAN Lei. Dual-NIC Mutual Backup Scheme for Access Point Handoff in Software Defined Wireless Networks [J]. Computer Science, 2021, 48(6A): 427-431.
[11] ZHUO Ya-qian, OU Bo. Face Anti-spoofing Algorithm for Noisy Environment [J]. Computer Science, 2021, 48(6A): 443-447.
[12] GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219.
[13] LEI Jian-mei, ZENG Ling-qiu, MU Jie, CHEN Li-dong, WANG Cong, CHAI Yong. Reverse Diagnostic Method Based on Vehicle EMC Standard Test and Machine Learning [J]. Computer Science, 2021, 48(6): 190-195.
[14] WANG You-wei, ZHU Chen, ZHU Jian-ming, LI Yang, FENG Li-zhou, LIU Jiang-chun. User Interest Dictionary and LSTM Based Method for Personalized Emotion Classification [J]. Computer Science, 2021, 48(11A): 251-257.
[15] QIAN Guang-ming, YI Chao. Real Time Wireless Connection Scheme for Multi-nodes [J]. Computer Science, 2021, 48(11A): 446-451.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!