Spectrum prediction plays an important role for the secondary user(SU)to utilize the shared spectrum resources.However,currently utilized prediction methods are not well applied to spectrum with high burstiness,as par...Spectrum prediction plays an important role for the secondary user(SU)to utilize the shared spectrum resources.However,currently utilized prediction methods are not well applied to spectrum with high burstiness,as parameters of prediction models cannot be adjusted properly.This paper studies the prediction problem of bursty bands.Specifically,we first collect real Wi Fi transmission data in 2.4GHz Industrial,Scientific,Medical(ISM)band which is considered to have bursty characteristics.Feature analysis of the data indicates that the spectrum occupancy law of the data is time-variant,which suggests that the performance of commonly used single prediction model could be restricted.Considering that the match between diverse spectrum states and multiple prediction models may essentially improve the prediction performance,we then propose a deep-reinforcement learning based multilayer perceptron(DRL-MLP)method to address this matching problem.The state space of the method is composed of feature vectors,and each of the vectors contains multi-dimensional feature values.Meanwhile,the action space consists of several multilayer perceptrons(MLPs)that are trained on the basis of multiple classified data sets.We finally conduct experiments with the collected real data and simulations with generated data to verify the performance of the proposed method.The results demonstrate that the proposed method significantly outperforms the stateof-the-art methods in terms of the prediction accuracy.展开更多
Traditional packet switching networks have typically employed window-based congestion control schemes in order to regulate traffic flow. In ATM networks, the high speed of the communication links and the varied nature...Traditional packet switching networks have typically employed window-based congestion control schemes in order to regulate traffic flow. In ATM networks, the high speed of the communication links and the varied nature of the carried traffic make such schemes inappropriate. Therefore, simpler and more efficient schemes have to be proposed to improve the congestion control for ATM switching. This paper presents an exact performance analysis of ATM switching whose inputs consist of Continuous-Bit-Rate(CBR) and bursty traffic. The CBR traffic and bursty traffic are described by Bernoulli process and the Interrupted Bernoulli Process(IBP), respectively. Bursty traffic smoothing mechanism is analyzed. With the use of a recursive algorithm, the cell loss probability and the average delay for ATM switching of mixed CBR and bursty traffic are exactly calculated. Traffic smoothing could be implemented at a slower peak rate keeping the average rate constant or decreasing the average bursty length. Both numerical展开更多
The ion-to-electron temperature ratio is a good indicator of the processes involved in solar wind plasma entering and being transported inside Earth’s plasma sheet.In this study,we have demonstrated that patchy magne...The ion-to-electron temperature ratio is a good indicator of the processes involved in solar wind plasma entering and being transported inside Earth’s plasma sheet.In this study,we have demonstrated that patchy magnetic reconnection has the potential to preserve the ion-to-electron temperature ratio under certain conditions.If the charged particles are non-adiabatically accelerated no more than once in a single reconnection,the temperature ratio would be preserved;on the other hand,this ratio would not be preserved if they are accelerated multiple times.Consequently,under a northward interplanetary magnetic field(IMF)condition,the reconnection in the nonlinear phase of the Kelvin-Helmholtz instability is the dominant process for solar-originated plasma entering the Earth’s magnetosphere,and the ion-to-electron temperature ratio is preserved inside the plasma sheet.When the direction of the IMF is southward,the reflection of electrons from the magnetic mirror point,and subsequent multiple non-adiabatic accelerations at the reconnection site,are the primary reasons for the observed low ion-to-electron temperature ratio close to the Earth at midnight.While reconnections that occur in the night-side far tail might preserve the ratio,turbulence on the boundaries of the bursty bulk flows(BBFs)could change the ratio in the far tail through the violation of the frozen-in condition of the ions.The plateau in the contour of the calculated ion-to-electron temperature ratio in the down tail distance between 40 and 60 Earth radii may explain the strong correlation between the ion and electron temperatures in the outer central plasma sheet,which has not been clearly understood till date.展开更多
High time resolution measurements of the electrostatic fluctuations and the turbulent particle and energy fluxes have been performed with a Langmuir probe array in the edge plasma in HT-7 tokamak. Bursty behaviour was...High time resolution measurements of the electrostatic fluctuations and the turbulent particle and energy fluxes have been performed with a Langmuir probe array in the edge plasma in HT-7 tokamak. Bursty behaviour was observed in the time resolved turbulent fluxes with positive skewness and large kurtosis. The contribution of the large sporadic bursts to the transport losses were estimated. The analysis shows that the turbulent fluxes have different behaviour in different frequency domains and the probability distribution functions (PDFs) of the particle and energy fluxes present two distinct scaling ranges. All these are essentially consistent with the predictions of the self-organized criticality (SOC) model, though further studies are needed.展开更多
The periodic cell stream is a very important member among the input traffic sources in ATM networks. In this paper, a finite-buffered ATM multiplexer with traffic sources composed of a periodic cell stream, multiple i...The periodic cell stream is a very important member among the input traffic sources in ATM networks. In this paper, a finite-buffered ATM multiplexer with traffic sources composed of a periodic cell stream, multiple i.i.d Bernoulli cell streams and bursty two-state Markov Modulated Bernoulli Process (MMBP) cell streams is exactly analyzed. The probability mass function of queuing delay, the autocorrelation and power spectrum of delay jitter for this periodic cell stream are derived. The analysis is used to expose the behavior of delay jitter for a periodic cell stream through an ATM multiplexer in a bursty traffic environment. The simulation results indicate that the analytical results are accurate.展开更多
In ATM networks, bursty sources can be described as the Interrupted Bernoulli Process(IBP). With the use of the thin process theory, the Probability Generating Function(PGF) of the IBP is obtained. An iterative algori...In ATM networks, bursty sources can be described as the Interrupted Bernoulli Process(IBP). With the use of the thin process theory, the Probability Generating Function(PGF) of the IBP is obtained. An iterative algorithm, which can be used to calculate the IBP probability distribution, is presented. The bursty source’s equivalent description is discussed. It is proposed that the leaky bucket output process can be approximately described as the IBP. The accuracy of the analytical results has been largely validated by means of the simulation approach. Moreover, how to improve its accuracy is discussed. The smoothing function of the leaky bucket algorithm is quantitatively analyzed.展开更多
A bursty traffic model is introduced in this paper to describe the statistical characteristics of packet video. The performance of leady bucket algorithm with bursty traffic input is analyzed. The influences of variou...A bursty traffic model is introduced in this paper to describe the statistical characteristics of packet video. The performance of leady bucket algorithm with bursty traffic input is analyzed. The influences of various parameters on QOS (Quality of Service) are investigated. The analysis shows that although the loss probability decreases through expanding the buffer capacity, the delay and delay jitter increase, whose effect on QOS will not be negligible.展开更多
Social media like Twitter who serves as a novel news medium and has become increasingly popular since its establishment. Large scale first-hand user-generated tweets motivate automatic event detection on Twitter. Prev...Social media like Twitter who serves as a novel news medium and has become increasingly popular since its establishment. Large scale first-hand user-generated tweets motivate automatic event detection on Twitter. Previous unsupervised approaches detected events by clustering words. These methods detect events using burstiness,which measures surging frequencies of words at certain time windows. However,event clusters represented by a set of individual words are difficult to understand. This issue is addressed by building a document-level event detection model that directly calculates the burstiness of tweets,leveraging distributed word representations for modeling semantic information,thereby avoiding sparsity. Results show that the document-level model not only offers event summaries that are directly human-readable,but also gives significantly improved accuracies compared to previous methods on unsupervised tweet event detection,which are based on words/segments.展开更多
Since Internet is dominated by TCP-based applications, active queue management (AQM) is considered as an effective way for congestion control. However, most AQM schemes suffer obvious performance degradation with dy...Since Internet is dominated by TCP-based applications, active queue management (AQM) is considered as an effective way for congestion control. However, most AQM schemes suffer obvious performance degradation with dynamic traffic. Extensive measurements found that Internet traffic is extremely bursty and possibly self-similar. We propose in this paper a new AQM scheme called multiscale controller (MSC) based on the understanding of traffic burstiness in multiple time scale. Different from most of other AQM schemes, MSC combines rate-based and queue-based control in two time scales. While the rate-based dropping on burst level (large time scales) determines the packet drop aggressiveness and is responsible for low and stable queuing delay, good robustness and responsiveness, the queue-based modulation of the packet drop probability on packet level (small time scales) will bring low loss and high throughput. Stability analysis is performed based on a fluid-flow model of the TCP/MSC congestion control system and simulation results show that MSC outperforms many of the current AQM schemes.展开更多
Mobile Cloud Computing (MCC) is a modern architecture that brings together cloudcomputing, mobile computing and wireless networks to assist mobile devices in storage,computing and communication. A cloud environment is...Mobile Cloud Computing (MCC) is a modern architecture that brings together cloudcomputing, mobile computing and wireless networks to assist mobile devices in storage,computing and communication. A cloud environment is developed to support a widerange of users that request the cloud resources in a dynamic environment with possible constraints. Burstiness in users service requests causes drastic and unpredictableincreases in the resource requests that have a crucial impact on policies of resourceallocation. How can the cloud system efficiently handle such burstiness when the cloudresources are limited? This problem becomes a hot issue in the MCC research area. Inthis paper, we develop a system model for the resource allocation based on the SemiMarkovian Decision Process (SMDP), able of dynamically assigning the mobile servicerequests to a set of cloud resources, to optimize the usage of cloud resources and maximize the total long-term expected system reward when the arrival process is a finitestate Markov-Modulated Poisson Process (MMPP). Numerical results show that ourproposed model performs much better than the Greedy algorithm in terms of achievinghigher system rewards and lower service requests blocking probabilities, especially whenthe burstiness degree is high, and the cloud resources are limited.展开更多
This paper, using the dataset of BBFs (bursty bulk flows) observed by two Cluster satellites C1 and C4, studies the difference between onset times of BBFs observed by C1 and C4. It is found that the onset time diffe...This paper, using the dataset of BBFs (bursty bulk flows) observed by two Cluster satellites C1 and C4, studies the difference between onset times of BBFs observed by C1 and C4. It is found that the onset time differences of most of BBFs observed by Cl and C4 are smaller than 60 s. The average onset time difference of BBFs of CI and C4 is 68.5 s. The probabilities of onset time difference of BBFs of C1 and C4 larger than 30, 60, 90 and 120 s are respectively 55%, 35%, 27% and 23%. The largest onset time difference of BBFs of C1 and C4 decreases with the increase of earthward component of maximum velocities of BBFs. The onset time difference of BBFs of C1 and C4 results from the velocity inhomogeneity inside the flow channel of BBF, which may be produced in propagation path and/or in source region of BBFs. Such a wide range of onset time difference of BBFs suggests that the velocity inhomogeneity inside the flow channel of BBF is various. These results are very important to the current study of substorm research based on THEMIS data because they indicate that it is impossible to determine the onset time of BBF with a single satellite.展开更多
Detecting and using bursty pattems to analyze text streams has been one of the fundamental approaches in many temporal text mining applications. So far, most existing studies have focused on developing methods to dete...Detecting and using bursty pattems to analyze text streams has been one of the fundamental approaches in many temporal text mining applications. So far, most existing studies have focused on developing methods to detect bursty features based purely on term frequency changes. Few have taken the semantic contexts of bursty features into consideration, and as a result the detected bursty features may not always be interesting and can be hard to interpret. In this article, we propose to model the contexts of bursty features using a language modeling approach. We propose two methods to estimate the context language models based on sentence-level context and document-level context. We then propose a novel topic diversity-based metric using the context models to find newsworthy bursty features. We also propose to use the context models to automatically assign meaningful tags to bursty features. Using a large corpus of news articles, we quantitatively show that the proposed context language models for bursty features can effectively help rank bursty features based on their newsworthiness and to assign meaningful tags to annotate bursty features. We also use two example text mining applications to qualitatively demonstrate the usefulness of bursty feature ranking and tagging.展开更多
The performance of the algorithm of the data channel scheduling algorithm of latest available unscheduled channel with void filling (LAUC-VF) under bursty traffic is presented firstly. A bursty traffic model for optic...The performance of the algorithm of the data channel scheduling algorithm of latest available unscheduled channel with void filling (LAUC-VF) under bursty traffic is presented firstly. A bursty traffic model for optical burst switch performance simulation is also introduced.展开更多
The error patterns of a wireless channel can be represented by a binary sequence of ones(burst) and zeros(run),which is referred to as a trace.Recent surveys have shown that the run length distribution of a wireless c...The error patterns of a wireless channel can be represented by a binary sequence of ones(burst) and zeros(run),which is referred to as a trace.Recent surveys have shown that the run length distribution of a wireless channel is an intrinsically heavy-tailed distribution.Analytical models to characterize such features have to deal with the trade-off between complexity and accuracy.In this paper,we use an independent but not identically distributed(inid) stochastic process to characterize such channel behavior and show how to parameterize the inid bit error model on the basis of a trace.The proposed model has merely two parameters both having intuitive meanings and can be easily figured out from a trace.Compared with chaotic maps,the inid bit error model is simple for practical use but can still be deprived from heavy-tailed distribution in theory.Simulation results demonstrate that the inid model can match the trace,but with fewer parameters.We then propose an improvement on the inid model to capture the 'bursty' nature of channel errors,described by burst length distribution.Our theoretical analysis is supported by an experimental evaluation.展开更多
基金supported in part by the China National Key R&D Program(no.2020YF-B1808000)Beijing Natural Science Foundation(No.L192002)+2 种基金in part by the Fundamental Research Funds for the Central Universities(No.328202206)the National Natural Science Foundation of China(No.61971058)in part by"Advanced and sophisticated"discipline construction project of universities in Beijing(No.20210013Z0401)。
文摘Spectrum prediction plays an important role for the secondary user(SU)to utilize the shared spectrum resources.However,currently utilized prediction methods are not well applied to spectrum with high burstiness,as parameters of prediction models cannot be adjusted properly.This paper studies the prediction problem of bursty bands.Specifically,we first collect real Wi Fi transmission data in 2.4GHz Industrial,Scientific,Medical(ISM)band which is considered to have bursty characteristics.Feature analysis of the data indicates that the spectrum occupancy law of the data is time-variant,which suggests that the performance of commonly used single prediction model could be restricted.Considering that the match between diverse spectrum states and multiple prediction models may essentially improve the prediction performance,we then propose a deep-reinforcement learning based multilayer perceptron(DRL-MLP)method to address this matching problem.The state space of the method is composed of feature vectors,and each of the vectors contains multi-dimensional feature values.Meanwhile,the action space consists of several multilayer perceptrons(MLPs)that are trained on the basis of multiple classified data sets.We finally conduct experiments with the collected real data and simulations with generated data to verify the performance of the proposed method.The results demonstrate that the proposed method significantly outperforms the stateof-the-art methods in terms of the prediction accuracy.
基金Supported by the National Natural Science Foundation of ChinaFoundation of the Acadency of Electronic Science,Chinathe National Postdoctoral Science Fund of China
文摘Traditional packet switching networks have typically employed window-based congestion control schemes in order to regulate traffic flow. In ATM networks, the high speed of the communication links and the varied nature of the carried traffic make such schemes inappropriate. Therefore, simpler and more efficient schemes have to be proposed to improve the congestion control for ATM switching. This paper presents an exact performance analysis of ATM switching whose inputs consist of Continuous-Bit-Rate(CBR) and bursty traffic. The CBR traffic and bursty traffic are described by Bernoulli process and the Interrupted Bernoulli Process(IBP), respectively. Bursty traffic smoothing mechanism is analyzed. With the use of a recursive algorithm, the cell loss probability and the average delay for ATM switching of mixed CBR and bursty traffic are exactly calculated. Traffic smoothing could be implemented at a slower peak rate keeping the average rate constant or decreasing the average bursty length. Both numerical
文摘The ion-to-electron temperature ratio is a good indicator of the processes involved in solar wind plasma entering and being transported inside Earth’s plasma sheet.In this study,we have demonstrated that patchy magnetic reconnection has the potential to preserve the ion-to-electron temperature ratio under certain conditions.If the charged particles are non-adiabatically accelerated no more than once in a single reconnection,the temperature ratio would be preserved;on the other hand,this ratio would not be preserved if they are accelerated multiple times.Consequently,under a northward interplanetary magnetic field(IMF)condition,the reconnection in the nonlinear phase of the Kelvin-Helmholtz instability is the dominant process for solar-originated plasma entering the Earth’s magnetosphere,and the ion-to-electron temperature ratio is preserved inside the plasma sheet.When the direction of the IMF is southward,the reflection of electrons from the magnetic mirror point,and subsequent multiple non-adiabatic accelerations at the reconnection site,are the primary reasons for the observed low ion-to-electron temperature ratio close to the Earth at midnight.While reconnections that occur in the night-side far tail might preserve the ratio,turbulence on the boundaries of the bursty bulk flows(BBFs)could change the ratio in the far tail through the violation of the frozen-in condition of the ions.The plateau in the contour of the calculated ion-to-electron temperature ratio in the down tail distance between 40 and 60 Earth radii may explain the strong correlation between the ion and electron temperatures in the outer central plasma sheet,which has not been clearly understood till date.
基金supported by the the Scientific Startup Foundation of Ocean University of China (No.0900-813586)
文摘High time resolution measurements of the electrostatic fluctuations and the turbulent particle and energy fluxes have been performed with a Langmuir probe array in the edge plasma in HT-7 tokamak. Bursty behaviour was observed in the time resolved turbulent fluxes with positive skewness and large kurtosis. The contribution of the large sporadic bursts to the transport losses were estimated. The analysis shows that the turbulent fluxes have different behaviour in different frequency domains and the probability distribution functions (PDFs) of the particle and energy fluxes present two distinct scaling ranges. All these are essentially consistent with the predictions of the self-organized criticality (SOC) model, though further studies are needed.
文摘The periodic cell stream is a very important member among the input traffic sources in ATM networks. In this paper, a finite-buffered ATM multiplexer with traffic sources composed of a periodic cell stream, multiple i.i.d Bernoulli cell streams and bursty two-state Markov Modulated Bernoulli Process (MMBP) cell streams is exactly analyzed. The probability mass function of queuing delay, the autocorrelation and power spectrum of delay jitter for this periodic cell stream are derived. The analysis is used to expose the behavior of delay jitter for a periodic cell stream through an ATM multiplexer in a bursty traffic environment. The simulation results indicate that the analytical results are accurate.
文摘In ATM networks, bursty sources can be described as the Interrupted Bernoulli Process(IBP). With the use of the thin process theory, the Probability Generating Function(PGF) of the IBP is obtained. An iterative algorithm, which can be used to calculate the IBP probability distribution, is presented. The bursty source’s equivalent description is discussed. It is proposed that the leaky bucket output process can be approximately described as the IBP. The accuracy of the analytical results has been largely validated by means of the simulation approach. Moreover, how to improve its accuracy is discussed. The smoothing function of the leaky bucket algorithm is quantitatively analyzed.
基金Supported by Foundation of Electronic Science Institutethe National Natural Science Foundation of China
文摘A bursty traffic model is introduced in this paper to describe the statistical characteristics of packet video. The performance of leady bucket algorithm with bursty traffic input is analyzed. The influences of various parameters on QOS (Quality of Service) are investigated. The analysis shows that although the loss probability decreases through expanding the buffer capacity, the delay and delay jitter increase, whose effect on QOS will not be negligible.
基金Supported by the National High Technology Research and Development Programme of China(No.2015AA015405)
文摘Social media like Twitter who serves as a novel news medium and has become increasingly popular since its establishment. Large scale first-hand user-generated tweets motivate automatic event detection on Twitter. Previous unsupervised approaches detected events by clustering words. These methods detect events using burstiness,which measures surging frequencies of words at certain time windows. However,event clusters represented by a set of individual words are difficult to understand. This issue is addressed by building a document-level event detection model that directly calculates the burstiness of tweets,leveraging distributed word representations for modeling semantic information,thereby avoiding sparsity. Results show that the document-level model not only offers event summaries that are directly human-readable,but also gives significantly improved accuracies compared to previous methods on unsupervised tweet event detection,which are based on words/segments.
基金Supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2003CB314801, the National Research Foundation for the Doctoral Program of Higher Education of China under Grant No. 20040286001 and the National Natural Science Foundation of China under Grant No. 90604003. Acknowledgments The authors would like to thank Professor Guan-Qun Gu for his supervision and Professor Jun Shen for his comments on an early draft of this paper.
文摘Since Internet is dominated by TCP-based applications, active queue management (AQM) is considered as an effective way for congestion control. However, most AQM schemes suffer obvious performance degradation with dynamic traffic. Extensive measurements found that Internet traffic is extremely bursty and possibly self-similar. We propose in this paper a new AQM scheme called multiscale controller (MSC) based on the understanding of traffic burstiness in multiple time scale. Different from most of other AQM schemes, MSC combines rate-based and queue-based control in two time scales. While the rate-based dropping on burst level (large time scales) determines the packet drop aggressiveness and is responsible for low and stable queuing delay, good robustness and responsiveness, the queue-based modulation of the packet drop probability on packet level (small time scales) will bring low loss and high throughput. Stability analysis is performed based on a fluid-flow model of the TCP/MSC congestion control system and simulation results show that MSC outperforms many of the current AQM schemes.
文摘Mobile Cloud Computing (MCC) is a modern architecture that brings together cloudcomputing, mobile computing and wireless networks to assist mobile devices in storage,computing and communication. A cloud environment is developed to support a widerange of users that request the cloud resources in a dynamic environment with possible constraints. Burstiness in users service requests causes drastic and unpredictableincreases in the resource requests that have a crucial impact on policies of resourceallocation. How can the cloud system efficiently handle such burstiness when the cloudresources are limited? This problem becomes a hot issue in the MCC research area. Inthis paper, we develop a system model for the resource allocation based on the SemiMarkovian Decision Process (SMDP), able of dynamically assigning the mobile servicerequests to a set of cloud resources, to optimize the usage of cloud resources and maximize the total long-term expected system reward when the arrival process is a finitestate Markov-Modulated Poisson Process (MMPP). Numerical results show that ourproposed model performs much better than the Greedy algorithm in terms of achievinghigher system rewards and lower service requests blocking probabilities, especially whenthe burstiness degree is high, and the cloud resources are limited.
基金supported by the National Natural Science Foundation of China (Grant Nos. 40931054 and 41174141)National Basic Research Program of China ("973" Program) (Grant No. 2011CB811404)
文摘This paper, using the dataset of BBFs (bursty bulk flows) observed by two Cluster satellites C1 and C4, studies the difference between onset times of BBFs observed by C1 and C4. It is found that the onset time differences of most of BBFs observed by Cl and C4 are smaller than 60 s. The average onset time difference of BBFs of CI and C4 is 68.5 s. The probabilities of onset time difference of BBFs of C1 and C4 larger than 30, 60, 90 and 120 s are respectively 55%, 35%, 27% and 23%. The largest onset time difference of BBFs of C1 and C4 decreases with the increase of earthward component of maximum velocities of BBFs. The onset time difference of BBFs of C1 and C4 results from the velocity inhomogeneity inside the flow channel of BBF, which may be produced in propagation path and/or in source region of BBFs. Such a wide range of onset time difference of BBFs suggests that the velocity inhomogeneity inside the flow channel of BBF is various. These results are very important to the current study of substorm research based on THEMIS data because they indicate that it is impossible to determine the onset time of BBF with a single satellite.
基金Acknowledgements The authors thank the anonymous reviewers for their valuable and constructive comments. The work was partially supported by the National Natural Science Foundation of China (Grant No. 61502502), the National Basic Research Program (973 Program) of China (2014CB340403), Beijing Natural Science Foundation (4162032), and the Open Fund of Beijing Key Laboratory on Integration and Analysis of Large-scale Stream Data, North China University of Technology, China.
文摘Detecting and using bursty pattems to analyze text streams has been one of the fundamental approaches in many temporal text mining applications. So far, most existing studies have focused on developing methods to detect bursty features based purely on term frequency changes. Few have taken the semantic contexts of bursty features into consideration, and as a result the detected bursty features may not always be interesting and can be hard to interpret. In this article, we propose to model the contexts of bursty features using a language modeling approach. We propose two methods to estimate the context language models based on sentence-level context and document-level context. We then propose a novel topic diversity-based metric using the context models to find newsworthy bursty features. We also propose to use the context models to automatically assign meaningful tags to bursty features. Using a large corpus of news articles, we quantitatively show that the proposed context language models for bursty features can effectively help rank bursty features based on their newsworthiness and to assign meaningful tags to annotate bursty features. We also use two example text mining applications to qualitatively demonstrate the usefulness of bursty feature ranking and tagging.
文摘The performance of the algorithm of the data channel scheduling algorithm of latest available unscheduled channel with void filling (LAUC-VF) under bursty traffic is presented firstly. A bursty traffic model for optical burst switch performance simulation is also introduced.
基金Project supported by the National Natural Science Foundationof China (Nos. 61103010,61103190,and 60803100)the National Basic Research Program (973) of China (No. 2012CB933500)the High-Tech R&D Program (863) of China (No.2012AA011001)
文摘The error patterns of a wireless channel can be represented by a binary sequence of ones(burst) and zeros(run),which is referred to as a trace.Recent surveys have shown that the run length distribution of a wireless channel is an intrinsically heavy-tailed distribution.Analytical models to characterize such features have to deal with the trade-off between complexity and accuracy.In this paper,we use an independent but not identically distributed(inid) stochastic process to characterize such channel behavior and show how to parameterize the inid bit error model on the basis of a trace.The proposed model has merely two parameters both having intuitive meanings and can be easily figured out from a trace.Compared with chaotic maps,the inid bit error model is simple for practical use but can still be deprived from heavy-tailed distribution in theory.Simulation results demonstrate that the inid model can match the trace,but with fewer parameters.We then propose an improvement on the inid model to capture the 'bursty' nature of channel errors,described by burst length distribution.Our theoretical analysis is supported by an experimental evaluation.