Cloud federation has emerged as a new paradigm in which different service providers collaborate to overcome limitation of cloud resource during sudden spikes in demand and improve quality of service (QoS) for delivered cloud services. The growing number of cloud federation to provide cloud services has made service selection a complex task due to varied nature of parameters like price, QoS and trust of different federations. In this context, formal decision making methodology is required to find the best federation which can deliver a services with high QoS and trust in a cost effective way. The proposed model conducts a multi-criteria decision analysis to select best cloud federation in specific time period in accordance with user preference over each parameter. The experimental result and analysis validate the effectiveness of our proposed model.
{"title":"Multi-criteria based federation selection in cloud","authors":"Benay Kumar Ray, Asif Iqbal Middya, Sarbani Roy, Sunirmal Khatua","doi":"10.1109/COMSNETS.2017.7945375","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945375","url":null,"abstract":"Cloud federation has emerged as a new paradigm in which different service providers collaborate to overcome limitation of cloud resource during sudden spikes in demand and improve quality of service (QoS) for delivered cloud services. The growing number of cloud federation to provide cloud services has made service selection a complex task due to varied nature of parameters like price, QoS and trust of different federations. In this context, formal decision making methodology is required to find the best federation which can deliver a services with high QoS and trust in a cost effective way. The proposed model conducts a multi-criteria decision analysis to select best cloud federation in specific time period in accordance with user preference over each parameter. The experimental result and analysis validate the effectiveness of our proposed model.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126897389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945361
Yan Shi, S. Biswas
This paper presents a framework for a firewall to analyze and block BitTorrent file-sharing protocol using Traffic Analysis (TA) methods. BitTorrent traffic can be a concern of network administrators and is a valuable target for TA based investigation. In this work, the ability of a TA based classifier to identify the existence of BitTorrent traffic is tested under the condition that it is not only encrypted by a Virtual Private Network (VPN) tunnel but also mixed with other types of network traffic (including video streaming traffic and web traffic). The TA based classifier is comprised of 2 steps: a pre-filtering step and the actual classification step. The test results show that not only is it possible for the TA based classifier to distinguish BitTorrent traffic from the encrypted mixture, but the classifier can also tell the source of the streaming video in the mixture with high accuracy. The 2-step classifier is also proven to have boosted the accuracy by 15%. The results indicate the possibility of implementing a TA based firewall for monitoring BitTorrent traffic.
{"title":"Using traffic analysis for simultaneous detection of BitTorrent and streaming video traffic sources","authors":"Yan Shi, S. Biswas","doi":"10.1109/COMSNETS.2017.7945361","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945361","url":null,"abstract":"This paper presents a framework for a firewall to analyze and block BitTorrent file-sharing protocol using Traffic Analysis (TA) methods. BitTorrent traffic can be a concern of network administrators and is a valuable target for TA based investigation. In this work, the ability of a TA based classifier to identify the existence of BitTorrent traffic is tested under the condition that it is not only encrypted by a Virtual Private Network (VPN) tunnel but also mixed with other types of network traffic (including video streaming traffic and web traffic). The TA based classifier is comprised of 2 steps: a pre-filtering step and the actual classification step. The test results show that not only is it possible for the TA based classifier to distinguish BitTorrent traffic from the encrypted mixture, but the classifier can also tell the source of the streaming video in the mixture with high accuracy. The 2-step classifier is also proven to have boosted the accuracy by 15%. The results indicate the possibility of implementing a TA based firewall for monitoring BitTorrent traffic.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945457
S. Woo
NFV (Network Function Virtualization) promises reducing management cost by moving network functions (NFs) from proprietary hardware to software on VMs (Virtual Machines) running on commodity servers [1]. NFV promises the benefit of virtualization to network applications. New NFs are easily deployed as VMs without specially packaged hardware. Virtualization ensures high availability through failover, and high resource utilization through elastic scaling of VM instances.
{"title":"Design and implementation of a network function framework for performance scalability","authors":"S. Woo","doi":"10.1109/COMSNETS.2017.7945457","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945457","url":null,"abstract":"NFV (Network Function Virtualization) promises reducing management cost by moving network functions (NFs) from proprietary hardware to software on VMs (Virtual Machines) running on commodity servers [1]. NFV promises the benefit of virtualization to network applications. New NFs are easily deployed as VMs without specially packaged hardware. Virtualization ensures high availability through failover, and high resource utilization through elastic scaling of VM instances.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126616612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945383
Mohanad Al-Ibadi, A. Dutta
Vehicle to Infrastructure (V2I) channels are particularly difficult to analyze because of high mobility and localized scattering from nearby vehicles and road-side features. The spatio-temporal variation of the scattering environment makes the channel a non-stationary stochastic process, which renders conventional, receiver-side channel conditioning techniques ineffective for this emerging application. Our work takes a radically different approach to introduce predictive analytics at the Road-Side Unit (RSU) to proactively compensate for channel variations over time and frequency while precisely fitting into contemporary protocols like Dedicated Short Range Communication (DSRC) and Wireless Access in Vehicular Environment (WAVE). By assimilating the channel state feedback built into these protocols, we employ an iterative learning algorithm to gather localized knowledge of the channel profile. This acquired knowledge is used to pre-condition the downlink waveform to lower the Bit Error Rate (BER) by ≈ 100 times, when compared to the current vehicular communication standards even at a relatively high Signal to Noise (SNR) of 17 dB. Further, our algorithm is able to predict the non-stationary V2I channel with an average absolute error of 10−2 in dense scattering environment.
{"title":"Predictive analytics for non-stationary V2I channel","authors":"Mohanad Al-Ibadi, A. Dutta","doi":"10.1109/COMSNETS.2017.7945383","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945383","url":null,"abstract":"Vehicle to Infrastructure (V2I) channels are particularly difficult to analyze because of high mobility and localized scattering from nearby vehicles and road-side features. The spatio-temporal variation of the scattering environment makes the channel a non-stationary stochastic process, which renders conventional, receiver-side channel conditioning techniques ineffective for this emerging application. Our work takes a radically different approach to introduce predictive analytics at the Road-Side Unit (RSU) to proactively compensate for channel variations over time and frequency while precisely fitting into contemporary protocols like Dedicated Short Range Communication (DSRC) and Wireless Access in Vehicular Environment (WAVE). By assimilating the channel state feedback built into these protocols, we employ an iterative learning algorithm to gather localized knowledge of the channel profile. This acquired knowledge is used to pre-condition the downlink waveform to lower the Bit Error Rate (BER) by ≈ 100 times, when compared to the current vehicular communication standards even at a relatively high Signal to Noise (SNR) of 17 dB. Further, our algorithm is able to predict the non-stationary V2I channel with an average absolute error of 10−2 in dense scattering environment.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127362261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945408
O. Pandey, Akshay Mahajan, R. Hegde
Small world characteristics (SWC) have been observed and studied in a wide range of disciplines such as social, biological, electrical and computer networks. However, the significance of SWC in wireless sensor network (WSN) applications has hitherto not been investigated. This work investigates the significance of introducing SWC in a conventional WSN for improving the accuracy of WSN node localization. In this context, nodes with large radio range are utilized to introduce SWC into a conventional WSN. Subsequently, a cooperative node localization method over the small world WSN using multidimensional scaling is developed. The proposed method yields improved localization performance when compared to node localization over conventional WSN.
{"title":"Cooperative localization in small world wireless sensor networks","authors":"O. Pandey, Akshay Mahajan, R. Hegde","doi":"10.1109/COMSNETS.2017.7945408","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945408","url":null,"abstract":"Small world characteristics (SWC) have been observed and studied in a wide range of disciplines such as social, biological, electrical and computer networks. However, the significance of SWC in wireless sensor network (WSN) applications has hitherto not been investigated. This work investigates the significance of introducing SWC in a conventional WSN for improving the accuracy of WSN node localization. In this context, nodes with large radio range are utilized to introduce SWC into a conventional WSN. Subsequently, a cooperative node localization method over the small world WSN using multidimensional scaling is developed. The proposed method yields improved localization performance when compared to node localization over conventional WSN.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116782760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945439
P. K. Sharma, B. Poddar, Soumyo Dey, S. Nandi, T. De, M. Saha, Sandip Mondal, Sujoy Saha
In present scenario of the world, environmental pollution is one of the leading challenges. Most often the educational institutes and organizations in developing countries suffer from polluted environment due to overcrowded rooms, improper planning and poor infrastructure. Students/faculties in a classroom could suffer from health issues due to prolonged exposure to such environment. On an average a student/faculty is exposed to such environment for eight hours per day. A student/faculty could undergo physical as well as cognitive hazards. This paper tends to detect the duration for which a classroom environment can be considered healthy for a given number of students. We built an Air Quality Monitoring Unit using low cost gas sensors which could compare the air contamination level of the environment with specified standards to detect when the environment tends to get uncomfortable for students/faculties. This in turn could result in reduced absentees and improved performance of students/faculties. Some useful results came to our observation such as, in a class of 30 students the concentration level of CO2 increases about 28.14% as compared to empty classroom whereas in a class of 40 students in the same classroom it increases about 55.33% in a duration of 2 hours.
{"title":"On detecting acceptable air contamination in classrooms using low cost sensors","authors":"P. K. Sharma, B. Poddar, Soumyo Dey, S. Nandi, T. De, M. Saha, Sandip Mondal, Sujoy Saha","doi":"10.1109/COMSNETS.2017.7945439","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945439","url":null,"abstract":"In present scenario of the world, environmental pollution is one of the leading challenges. Most often the educational institutes and organizations in developing countries suffer from polluted environment due to overcrowded rooms, improper planning and poor infrastructure. Students/faculties in a classroom could suffer from health issues due to prolonged exposure to such environment. On an average a student/faculty is exposed to such environment for eight hours per day. A student/faculty could undergo physical as well as cognitive hazards. This paper tends to detect the duration for which a classroom environment can be considered healthy for a given number of students. We built an Air Quality Monitoring Unit using low cost gas sensors which could compare the air contamination level of the environment with specified standards to detect when the environment tends to get uncomfortable for students/faculties. This in turn could result in reduced absentees and improved performance of students/faculties. Some useful results came to our observation such as, in a class of 30 students the concentration level of CO2 increases about 28.14% as compared to empty classroom whereas in a class of 40 students in the same classroom it increases about 55.33% in a duration of 2 hours.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117021726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945447
Safikureshi Mondal, N. Mukherjee
Information and Communication Technologies (ICT) provides access to sources of knowledge or health information through technologies like Internet, wireless network, mobile phones etc. Primary healthcare delivery based on mobile devices can achieve the goal of “health for all” and meet the requirements for people's basic health through a comprehensive approach. This paper proposes a framework for ICT based primary healthcare delivery from remote places particularly for regular supervision for neonatal care of pregnant woman to assist diagnosis of diseases of children, and immunization of children. These three main common primary healthcare services may address the problem of highest mortality rate according to National Rural Health Mission (NHRM). However, a lot of challenges are faced to implement these services. The workflow or activity diagrams are shown for the implementation of diagnosis assistance and neonatal care of pregnant woman and immunization of children.
{"title":"A framework for ICT-based primary healthcare delivery for children","authors":"Safikureshi Mondal, N. Mukherjee","doi":"10.1109/COMSNETS.2017.7945447","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945447","url":null,"abstract":"Information and Communication Technologies (ICT) provides access to sources of knowledge or health information through technologies like Internet, wireless network, mobile phones etc. Primary healthcare delivery based on mobile devices can achieve the goal of “health for all” and meet the requirements for people's basic health through a comprehensive approach. This paper proposes a framework for ICT based primary healthcare delivery from remote places particularly for regular supervision for neonatal care of pregnant woman to assist diagnosis of diseases of children, and immunization of children. These three main common primary healthcare services may address the problem of highest mortality rate according to National Rural Health Mission (NHRM). However, a lot of challenges are faced to implement these services. The workflow or activity diagrams are shown for the implementation of diagnosis assistance and neonatal care of pregnant woman and immunization of children.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945430
Punith B. Kotagi, Gowri Asaithambi
Most of the Indian urban roads are bi-directional in nature consists of mix up of different vehicle types with weak lane discipline. A mathematical or analytical treatment of such condition is found infeasible due to its complex nature. Hence, simulation has become inevitable tool for analysis and interpretation of such real world situations. There are only few studies which focuses exclusively on developing a bidirectional traffic simulation model considering the longitudinal and lateral behaviour of vehicles for urban undivided roads. With the above motivation, the present study focuses on development of simulation models for bi-directional mixed traffic flow using object oriented programming (OOP) concepts. The proposed model would be of significant assistance to traffic engineers while making key decisions in traffic control and management policies.
{"title":"Simulation framework for modeling bidirectional mixed traffic","authors":"Punith B. Kotagi, Gowri Asaithambi","doi":"10.1109/COMSNETS.2017.7945430","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945430","url":null,"abstract":"Most of the Indian urban roads are bi-directional in nature consists of mix up of different vehicle types with weak lane discipline. A mathematical or analytical treatment of such condition is found infeasible due to its complex nature. Hence, simulation has become inevitable tool for analysis and interpretation of such real world situations. There are only few studies which focuses exclusively on developing a bidirectional traffic simulation model considering the longitudinal and lateral behaviour of vehicles for urban undivided roads. With the above motivation, the present study focuses on development of simulation models for bi-directional mixed traffic flow using object oriented programming (OOP) concepts. The proposed model would be of significant assistance to traffic engineers while making key decisions in traffic control and management policies.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122692796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945372
Paul C. Wood, S. Bagchi, Alefiya Hussain
The smart grid (SG) promises to revolutionize power grid efficiency and reliability by bringing wide-area control and coordination between both power producers and widely distributed consumers. Such improvements, however, depend on reliable communication infrastructures for cooperation, thus creating an interdependence between wide area networks and the power grid. Real-time pricing (RTP) systems coordinate producers and consumers via price signals, and recent research has shown that network disruptions in RTPs can significantly harm or disrupt power grid operation. In this paper, we theorize and demonstrate how strategic network disruptions can further disrupt grid operations in ways that are profitable to a strategic adversary. We quantify the economic impacts of a strategic adversary that utilizes denial of service (DoS) attacks to gain a financial advantage in the power market, without compromising the integrity of the RTP signals. The adversary develops a strategy of when and where to launch DoS attacks by utilizing our algorithm that optimizes prices in her favor. A defender minimizes these financial gains by obfuscating the network targets, reducing the effectiveness of attacks. Our results provide insights to the dependability of RTP when deployed across disruptable wide-area best-effort communication networks.
{"title":"Profiting from attacks on real-time price communications in smart grids","authors":"Paul C. Wood, S. Bagchi, Alefiya Hussain","doi":"10.1109/COMSNETS.2017.7945372","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945372","url":null,"abstract":"The smart grid (SG) promises to revolutionize power grid efficiency and reliability by bringing wide-area control and coordination between both power producers and widely distributed consumers. Such improvements, however, depend on reliable communication infrastructures for cooperation, thus creating an interdependence between wide area networks and the power grid. Real-time pricing (RTP) systems coordinate producers and consumers via price signals, and recent research has shown that network disruptions in RTPs can significantly harm or disrupt power grid operation. In this paper, we theorize and demonstrate how strategic network disruptions can further disrupt grid operations in ways that are profitable to a strategic adversary. We quantify the economic impacts of a strategic adversary that utilizes denial of service (DoS) attacks to gain a financial advantage in the power market, without compromising the integrity of the RTP signals. The adversary develops a strategy of when and where to launch DoS attacks by utilizing our algorithm that optimizes prices in her favor. A defender minimizes these financial gains by obfuscating the network targets, reducing the effectiveness of attacks. Our results provide insights to the dependability of RTP when deployed across disruptable wide-area best-effort communication networks.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123885691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/COMSNETS.2017.7945409
K. P. K. Reddy, Yoganandam Yeleswarapu, S. Darak
In this paper, a USRP based testbed has been developed for evaluating the performance of cumulant feature based automatic modulation classifier (AMC) in a real radio environment. The proposed testbed consists of conventional radio transmitter with a capability to choose any one of BPSK, QPSK, QAM16 and QAM64 modulation schemes. The receiver extracts appropriate order cumulants from the received signal which are then used as features by support vector machine (SVM) based machine learning classifier. Experimental results demonstrate that the Probability of correct classification (Pec) in varying signal-to-noise ratios (SNR) follow the same increasing pattern as in case of simulation results.
{"title":"Performance evaluation of cumulant feature based automatic modulation classifier on USRP testbec","authors":"K. P. K. Reddy, Yoganandam Yeleswarapu, S. Darak","doi":"10.1109/COMSNETS.2017.7945409","DOIUrl":"https://doi.org/10.1109/COMSNETS.2017.7945409","url":null,"abstract":"In this paper, a USRP based testbed has been developed for evaluating the performance of cumulant feature based automatic modulation classifier (AMC) in a real radio environment. The proposed testbed consists of conventional radio transmitter with a capability to choose any one of BPSK, QPSK, QAM16 and QAM64 modulation schemes. The receiver extracts appropriate order cumulants from the received signal which are then used as features by support vector machine (SVM) based machine learning classifier. Experimental results demonstrate that the Probability of correct classification (Pec) in varying signal-to-noise ratios (SNR) follow the same increasing pattern as in case of simulation results.","PeriodicalId":168357,"journal":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127669936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}