Skip to main content
Top
Published in: Wireless Personal Communications 3/2018

07-08-2018

A Survey on Long Term Evolution Scheduling in Data Mining

Authors: Divya Mohan, Geetha Mary Amalanathan

Published in: Wireless Personal Communications | Issue 3/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Scheduling procedures implemented in wireless networks consists of varied workflows such as resource allocation, channel gain improvement, and reduction in packet arrival delay. Among these techniques, Long term evolution (LTE) scheduling is most preferable due to its high speed communication and low bandwidth consumption. LTE allocates resources to the workflow based on time and frequency domains. Normally, the information gathered prior to scheduling increases the processing time since each attributes of the users have to be verified. In order to solve this issue, parallel processing via data mining is analyzed in recent research studies. The label that is assigned to the user attributes contributes primarily on scheduling time slots effectively. The label assignment and parallel processing via data mining reduces the delay and increases the throughput respectively. Additionally, the matched data extraction from the library and the prediction of available channels with fewer dimensions posed major challenges in the LTE scheduling. This paper surveys about various LTE scheduling algorithms, dimensionality reduction techniques, optimal feature selection techniques, multi-level classification techniques, and data mining combined with LTE techniques. A brief survey illustrates the impact of each technique on 3G/4G networks, channel availability prediction, scheduling of time slots in detail. A brief comparison of the techniques involved in the respective LTE processes via tabular form reveals that the verification of channel and user availability are the primary functions of the LTE scheduling. The survey of this paper identifies the limitations such as computational complexity and poor scheduling performance in the existing systems and encourages researchers to develop novel algorithms for LTE scheduling.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adeniyi, D., Wei, Z., & Yongquan, Y. (2016). Automated web usage data mining and recommendation system using k-nearest neighbor (KNN) classification method. Applied Computing and Informatics, 12(1), 90–108.CrossRef Adeniyi, D., Wei, Z., & Yongquan, Y. (2016). Automated web usage data mining and recommendation system using k-nearest neighbor (KNN) classification method. Applied Computing and Informatics, 12(1), 90–108.CrossRef
2.
go back to reference Albataineh, Z., & Salem, F. M. (2017). Adaptive blind CDMA receivers based on ICA filtered structures. Circuits, Systems, and Signal Processing, 36(8), 3320–3348.CrossRef Albataineh, Z., & Salem, F. M. (2017). Adaptive blind CDMA receivers based on ICA filtered structures. Circuits, Systems, and Signal Processing, 36(8), 3320–3348.CrossRef
3.
go back to reference Alfayly, A., Mkwawa, I.-H., Sun, L., & Ifeachor, E. (2012). QoE-based performance evaluation of scheduling algorithms over LTE. In IEEE globecom workshops, IEEE (pp. 1362–1366). Alfayly, A., Mkwawa, I.-H., Sun, L., & Ifeachor, E. (2012). QoE-based performance evaluation of scheduling algorithms over LTE. In IEEE globecom workshops, IEEE (pp. 1362–1366).
4.
go back to reference Alguliev, R. M., Aliguliyev, R. M., & Nazirova, S. A. (2011). Classification of textual e-mail spam using data mining techniques. Applied Computational Intelligence and Soft Computing, 2011, 10. Alguliev, R. M., Aliguliyev, R. M., & Nazirova, S. A. (2011). Classification of textual e-mail spam using data mining techniques. Applied Computational Intelligence and Soft Computing, 2011, 10.
5.
go back to reference AlQahtani, S. A., & Alhassany, M. (2013 ). Comparing different LTE scheduling schemes. In 2013 9th international wireless communications and mobile computing conference (IWCMC), IEEE (pp. 264–269). AlQahtani, S. A., & Alhassany, M. (2013 ). Comparing different LTE scheduling schemes. In 2013 9th international wireless communications and mobile computing conference (IWCMC), IEEE (pp. 264–269).
6.
go back to reference Ameigeiras, P., Navarro-Ortiz, J., Andres-Maldonado, P., Lopez-Soler, J. M., Lorca, J., Perez-Tarrero, Q., et al. (2016). 3GPP QoS-based scheduling framework for LTE. EURASIP Journal on Wireless Communications and Networking, 2016(1), 1–14.CrossRef Ameigeiras, P., Navarro-Ortiz, J., Andres-Maldonado, P., Lopez-Soler, J. M., Lorca, J., Perez-Tarrero, Q., et al. (2016). 3GPP QoS-based scheduling framework for LTE. EURASIP Journal on Wireless Communications and Networking, 2016(1), 1–14.CrossRef
7.
go back to reference Bao, Y., Wu, H., & Liu, X. (2017). From prediction to action: Improving user experience with data-driven resource allocation. IEEE Journal on Selected Areas in Communications, 35(5), 1062–1075.CrossRef Bao, Y., Wu, H., & Liu, X. (2017). From prediction to action: Improving user experience with data-driven resource allocation. IEEE Journal on Selected Areas in Communications, 35(5), 1062–1075.CrossRef
8.
go back to reference Batina, L., Hogenboom, J., & van Woudenberg, J. G. (2012). Getting more from PCA: First results of using principal component analysis for extensive power analysis. In Cryptographers’ track at the RSA conference (pp. 383–397). Springer. Batina, L., Hogenboom, J., & van Woudenberg, J. G. (2012). Getting more from PCA: First results of using principal component analysis for extensive power analysis. In Cryptographers’ track at the RSA conference (pp. 383–397). Springer.
9.
go back to reference Beckmann, C. F. (2012). Modelling with independent components. Neuroimage, 62(2), 891–901.CrossRef Beckmann, C. F. (2012). Modelling with independent components. Neuroimage, 62(2), 891–901.CrossRef
10.
go back to reference Bertrand, B. A. P., Moustapha, D., Etienne, S., Souleymane, O., & Matthieu, A. (2016). A genetic algorithm for overall designing and planning of a long term evolution advanced network. American Journal of Operations Research, 6(04), 355.CrossRef Bertrand, B. A. P., Moustapha, D., Etienne, S., Souleymane, O., & Matthieu, A. (2016). A genetic algorithm for overall designing and planning of a long term evolution advanced network. American Journal of Operations Research, 6(04), 355.CrossRef
11.
go back to reference Bilbao Marón, M. N. (2014). Advanced meta-heuristic approaches and their application to operational optimization in forest wildfire management, Ph.D Thesis. Madrid: University of Alcala. Bilbao Marón, M. N. (2014). Advanced meta-heuristic approaches and their application to operational optimization in forest wildfire management, Ph.D Thesis. Madrid: University of Alcala.
12.
go back to reference Biral, A., Centenaro, M., Zanella, A., Vangelista, L., & Zorzi, M. (2015). The challenges of M2M massive access in wireless cellular networks. Digital Communications and Networks, 1(1), 1–19.CrossRef Biral, A., Centenaro, M., Zanella, A., Vangelista, L., & Zorzi, M. (2015). The challenges of M2M massive access in wireless cellular networks. Digital Communications and Networks, 1(1), 1–19.CrossRef
13.
go back to reference Challita, U., Dong, L., & Saad, W. (2017). Deep learning for proactive resource allocation in LTE-U networks. In European wireless technology conference. Challita, U., Dong, L., & Saad, W. (2017). Deep learning for proactive resource allocation in LTE-U networks. In European wireless technology conference.
14.
go back to reference Chen, Y.-C. (2015). Robust mobile data transport: Modeling, measurements, and implementation, Ph.D. Thesis. Amherst: University of Massachusetts. Chen, Y.-C. (2015). Robust mobile data transport: Modeling, measurements, and implementation, Ph.D. Thesis. Amherst: University of Massachusetts.
15.
go back to reference Chen, Y., Miao, D., Wang, R., & Wu, K. (2011). A rough set approach to feature selection based on power set tree. Knowledge-Based Systems, 24(2), 275–281.CrossRef Chen, Y., Miao, D., Wang, R., & Wu, K. (2011). A rough set approach to feature selection based on power set tree. Knowledge-Based Systems, 24(2), 275–281.CrossRef
16.
go back to reference Chernov, S., Chernogorov, F., Petrov, D., & Ristaniemi, T. (2014). Data mining framework for random access failure detection in LTE networks. In IEEE 25th annual international symposium on personal, indoor, and mobile radio communication (PIMRC), IEEE (pp. 1321–1326). Chernov, S., Chernogorov, F., Petrov, D., & Ristaniemi, T. (2014). Data mining framework for random access failure detection in LTE networks. In IEEE 25th annual international symposium on personal, indoor, and mobile radio communication (PIMRC), IEEE (pp. 1321–1326).
17.
go back to reference Chidhambararajan, K S Ba B. (2016). Fast and secure intelligence re-authentication m echanism for next generation subscribers. International Journal of Computer Technology and Applications, 9(9), 4175–4189. Chidhambararajan, K S Ba B. (2016). Fast and secure intelligence re-authentication m echanism for next generation subscribers. International Journal of Computer Technology and Applications, 9(9), 4175–4189.
18.
go back to reference Chisab, R. F., & Shukla, C. (2014). Performance evaluation Of 4G-LTE-SCFDMA scheme under SUI And ITU channel models. International Journal of Engineering & Technology IJET-IJENS , 14(1), 58–69. Chisab, R. F., & Shukla, C. (2014). Performance evaluation Of 4G-LTE-SCFDMA scheme under SUI And ITU channel models. International Journal of Engineering & Technology IJET-IJENS , 14(1), 58–69.
19.
go back to reference Dechene, D. J., & Shami, A. (2014). Energy-aware resource allocation strategies for LTE uplink with synchronous HARQ constraints. IEEE Transactions on Mobile Computing, 13(2), 422–433.CrossRef Dechene, D. J., & Shami, A. (2014). Energy-aware resource allocation strategies for LTE uplink with synchronous HARQ constraints. IEEE Transactions on Mobile Computing, 13(2), 422–433.CrossRef
20.
go back to reference Emary, E., Zawbaa, H. M., & Hassanien, A. E. (2016). Binary grey wolf optimization approaches for feature selection. Neurocomputing, 172, 371–381.CrossRef Emary, E., Zawbaa, H. M., & Hassanien, A. E. (2016). Binary grey wolf optimization approaches for feature selection. Neurocomputing, 172, 371–381.CrossRef
21.
go back to reference Esser, E., Moller, M., Osher, S., Sapiro, G., & Xin, J. (2012). A convex model for nonnegative matrix factorization and dimensionality reduction on physical space. IEEE Transactions on Image Processing, 21(7), 3239–3252.MathSciNetCrossRefMATH Esser, E., Moller, M., Osher, S., Sapiro, G., & Xin, J. (2012). A convex model for nonnegative matrix factorization and dimensionality reduction on physical space. IEEE Transactions on Image Processing, 21(7), 3239–3252.MathSciNetCrossRefMATH
22.
go back to reference Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., et al. (2017). State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Communications Surveys & Tutorials, 19(4), 2432–2455.CrossRef Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., et al. (2017). State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Communications Surveys & Tutorials, 19(4), 2432–2455.CrossRef
23.
go back to reference Guangming, W., & Xiaoliang, W. (2009). Notice of retraction application of classification algorithm based on association rules in the labor market. In International conference on e-Learning, e-Business, enterprise information systems, and e-Government, EEEE’0, IEEE (pp. 255–258). Guangming, W., & Xiaoliang, W. (2009). Notice of retraction application of classification algorithm based on association rules in the labor market. In International conference on e-Learning, e-Business, enterprise information systems, and e-Government, EEEE’0, IEEE (pp. 255–258).
24.
go back to reference Gupta, A., Verma, T., Bali, S., & Kaul, S. (2013). Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks. In Fifth international conference on communication systems and networks (COMSNETS), IEEE (pp. 1–60). Gupta, A., Verma, T., Bali, S., & Kaul, S. (2013). Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks. In Fifth international conference on communication systems and networks (COMSNETS), IEEE (pp. 1–60).
25.
go back to reference Huang, G.-B., Zhou, H., Ding, X., & Zhang, R. (2012). Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42(2), 513–529.CrossRef Huang, G.-B., Zhou, H., Ding, X., & Zhang, R. (2012). Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42(2), 513–529.CrossRef
26.
go back to reference Ingram, S., & Munzner, T. (2015). Dimensionality reduction for documents with nearest neighbor queries. Neurocomputing, 150, 557–569.CrossRef Ingram, S., & Munzner, T. (2015). Dimensionality reduction for documents with nearest neighbor queries. Neurocomputing, 150, 557–569.CrossRef
27.
go back to reference Juvonen, A., & Sipola, T. (2012). Adaptive framework for network traffic classification using dimensionality reduction and clustering. In 2012 4th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), IEEE (pp. 274–279). Juvonen, A., & Sipola, T. (2012). Adaptive framework for network traffic classification using dimensionality reduction and clustering. In 2012 4th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), IEEE (pp. 274–279).
28.
go back to reference Kabir, M. M., Shahjahan, M., & Murase, K. (2012). A new hybrid ant colony optimization algorithm for feature selection. Expert Systems with Applications, 39(3), 3747–3763.CrossRef Kabir, M. M., Shahjahan, M., & Murase, K. (2012). A new hybrid ant colony optimization algorithm for feature selection. Expert Systems with Applications, 39(3), 3747–3763.CrossRef
29.
go back to reference Kashef, S., & Nezamabadi-pour, H. (2015). An advanced ACO algorithm for feature subset selection. Neurocomputing, 147, 271–279.CrossRef Kashef, S., & Nezamabadi-pour, H. (2015). An advanced ACO algorithm for feature subset selection. Neurocomputing, 147, 271–279.CrossRef
30.
go back to reference Khan, A. H., Qadeer, M. A., Ansari, J. A., & Waheed, S. (2009). 4G as a next generation wireless network. In International conference on future computer and communication, ICFCC 2009, IEEE (pp. 334–338). Khan, A. H., Qadeer, M. A., Ansari, J. A., & Waheed, S. (2009). 4G as a next generation wireless network. In International conference on future computer and communication, ICFCC 2009, IEEE (pp. 334–338).
31.
go back to reference Klaine, P. V., Imran, M. A., Onireti, O., & Souza, R. D. (2017). A survey of machine learning techniques applied to self-organizing cellular networks. IEEE Communications Surveys & Tutorials, 19(4), 2392–2431.CrossRef Klaine, P. V., Imran, M. A., Onireti, O., & Souza, R. D. (2017). A survey of machine learning techniques applied to self-organizing cellular networks. IEEE Communications Surveys & Tutorials, 19(4), 2392–2431.CrossRef
32.
go back to reference Lai, W. K., & Tang, C.-L. (2013). QoS-aware downlink packet scheduling for LTE networks. Computer Networks, 57(7), 1689–1698.CrossRef Lai, W. K., & Tang, C.-L. (2013). QoS-aware downlink packet scheduling for LTE networks. Computer Networks, 57(7), 1689–1698.CrossRef
33.
go back to reference Lausch, A., Schmidt, A., & Tischendorf, L. (2015). Data mining and linked open data—New perspectives for data analysis in environmental research. Ecological Modelling, 295, 5–17.CrossRef Lausch, A., Schmidt, A., & Tischendorf, L. (2015). Data mining and linked open data—New perspectives for data analysis in environmental research. Ecological Modelling, 295, 5–17.CrossRef
34.
go back to reference Lehtimäki, P., & Raivio, K. A (2005). SOM based approach for visualization of GSM network performance data. In International conference on industrial, engineering and other applications of applied intelligent systems (pp. 588–598). Springer. Lehtimäki, P., & Raivio, K. A (2005). SOM based approach for visualization of GSM network performance data. In International conference on industrial, engineering and other applications of applied intelligent systems (pp. 588–598). Springer.
35.
go back to reference Lei, L., You, L., Dai, G., Vu, T. X., Yuan, D., & Chatzinotas, S. (2017). A deep learning approach for optimizing content delivering in cache-enabled HetNet. In 2017 international symposium on wireless communication systems (ISWCS), IEEE (pp. 449–453). Lei, L., You, L., Dai, G., Vu, T. X., Yuan, D., & Chatzinotas, S. (2017). A deep learning approach for optimizing content delivering in cache-enabled HetNet. In 2017 international symposium on wireless communication systems (ISWCS), IEEE (pp. 449–453).
36.
go back to reference Li, G. Y., Niu, J., Lee, D., Fan, J., & Fu, Y. (2014). Multi-cell coordinated scheduling and MIMO in LTE. IEEE Communications Surveys & Tutorials, 16(2), 761–775.CrossRef Li, G. Y., Niu, J., Lee, D., Fan, J., & Fu, Y. (2014). Multi-cell coordinated scheduling and MIMO in LTE. IEEE Communications Surveys & Tutorials, 16(2), 761–775.CrossRef
37.
go back to reference Li, L., & Kianmehr, K. (2012). Internet traffic classification based on associative classifiers. In 2012 IEEE international conference on cyber technology in automation, control, and intelligent systems (CYBER), IEEE (pp. 263–268). Li, L., & Kianmehr, K. (2012). Internet traffic classification based on associative classifiers. In 2012 IEEE international conference on cyber technology in automation, control, and intelligent systems (CYBER), IEEE (pp. 263–268).
38.
go back to reference Li, W., Prasad, S., Fowler, J. E., & Bruce, L. M. (2012). Locality-preserving dimensionality reduction and classification for hyperspectral image analysis. IEEE Transactions on Geoscience and Remote Sensing, 50(4), 1185–1198.CrossRef Li, W., Prasad, S., Fowler, J. E., & Bruce, L. M. (2012). Locality-preserving dimensionality reduction and classification for hyperspectral image analysis. IEEE Transactions on Geoscience and Remote Sensing, 50(4), 1185–1198.CrossRef
39.
go back to reference Lin, S.-W., Ying, K.-C., Lee, C.-Y., & Lee, Z.-J. (2012). An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Applied Soft Computing, 12(10), 3285–3290.CrossRef Lin, S.-W., Ying, K.-C., Lee, C.-Y., & Lee, Z.-J. (2012). An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Applied Soft Computing, 12(10), 3285–3290.CrossRef
40.
go back to reference Liu, L., Cheng, Y., Cai, L., Zhou, S., & Niu, Z. (2017). Deep learning based optimization in wireless network. In 2017 IEEE international conference on communications (ICC), IEEE (pp. 1–6). Liu, L., Cheng, Y., Cai, L., Zhou, S., & Niu, Z. (2017). Deep learning based optimization in wireless network. In 2017 IEEE international conference on communications (ICC), IEEE (pp. 1–6).
41.
go back to reference Ma, Z., Teschendorff, A. E., Leijon, A., Qiao, Y., Zhang, H., & Guo, J. (2015). Variational bayesian matrix factorization for bounded support data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(4), 876–889.CrossRef Ma, Z., Teschendorff, A. E., Leijon, A., Qiao, Y., Zhang, H., & Guo, J. (2015). Variational bayesian matrix factorization for bounded support data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(4), 876–889.CrossRef
42.
go back to reference Ma, Z., Xie, J., Li, H., Sun, Q., Si, Z., Zhang, J., et al. (2017). The role of data analysis in the development of intelligent energy networks. IEEE Network, 31(5), 88–95.CrossRef Ma, Z., Xie, J., Li, H., Sun, Q., Si, Z., Zhang, J., et al. (2017). The role of data analysis in the development of intelligent energy networks. IEEE Network, 31(5), 88–95.CrossRef
43.
go back to reference Ma, Z., Xue, J.-H., Leijon, A., Tan, Z.-H., Yang, Z., & Guo, J. (2016). Decorrelation of neutral vector variables: Theory and applications. IEEE Transactions on Neural Networks and Learning Systems, 29(1), 129–143.MathSciNetCrossRef Ma, Z., Xue, J.-H., Leijon, A., Tan, Z.-H., Yang, Z., & Guo, J. (2016). Decorrelation of neutral vector variables: Theory and applications. IEEE Transactions on Neural Networks and Learning Systems, 29(1), 129–143.MathSciNetCrossRef
44.
go back to reference Mao, B., Fadlullah, Z. M., Tang, F., Kato, N., Akashi, O., Inoue, T., et al. (2017). Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning. IEEE Transactions on Computers, 66(11), 1946–1960.MathSciNetCrossRefMATH Mao, B., Fadlullah, Z. M., Tang, F., Kato, N., Akashi, O., Inoue, T., et al. (2017). Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning. IEEE Transactions on Computers, 66(11), 1946–1960.MathSciNetCrossRefMATH
45.
go back to reference Mercaldo, F., Visaggio, C. A., Canfora, G., & Cimitile, A. (2016). Mobile malware detection in the real world. In IEEE/ACM international conference on software engineering companion (ICSE-C), IEEE (pp. 744–746). Mercaldo, F., Visaggio, C. A., Canfora, G., & Cimitile, A. (2016). Mobile malware detection in the real world. In IEEE/ACM international conference on software engineering companion (ICSE-C), IEEE (pp. 744–746).
47.
go back to reference Mukhopadhyay, A., Maulik, U., Bandyopadhyay, S., & Coello, C. A. C. (2014). A survey of multiobjective evolutionary algorithms for data mining: Part I. IEEE Transactions on Evolutionary Computation, 18(1), 4–19.CrossRef Mukhopadhyay, A., Maulik, U., Bandyopadhyay, S., & Coello, C. A. C. (2014). A survey of multiobjective evolutionary algorithms for data mining: Part I. IEEE Transactions on Evolutionary Computation, 18(1), 4–19.CrossRef
48.
go back to reference Nagpal, G., & Rajpoot, A. S. (2015). Scheduling exploiting frequency and multi-user diversity in LTE downlink systems with heterogeneous mobilities. MR International Journal of Engineering & Technology, 7(1), 29–40. Nagpal, G., & Rajpoot, A. S. (2015). Scheduling exploiting frequency and multi-user diversity in LTE downlink systems with heterogeneous mobilities. MR International Journal of Engineering & Technology, 7(1), 29–40.
49.
go back to reference Nguyen, D., Memik, G., Memik, S. O., & Choudhary, A. (2015). Real-time feature extraction for high speed networks. In International conference on field programmable logic and applications, 2005, IEEE (pp. 438–443). Nguyen, D., Memik, G., Memik, S. O., & Choudhary, A. (2015). Real-time feature extraction for high speed networks. In International conference on field programmable logic and applications, 2005, IEEE (pp. 438–443).
50.
go back to reference Niu, J., Lee, D., Ren, X., Li, G. Y., & Su, T. (2013). Scheduling exploiting frequency and multi-user diversity in LTE downlink systems. IEEE Transactions on Wireless Communications, 12(4), 1843–1849.CrossRef Niu, J., Lee, D., Ren, X., Li, G. Y., & Su, T. (2013). Scheduling exploiting frequency and multi-user diversity in LTE downlink systems. IEEE Transactions on Wireless Communications, 12(4), 1843–1849.CrossRef
51.
go back to reference Pan, S. J., Tsang, I. W., Kwok, J. T., & Yang, Q. (2011). Domain adaptation via transfer component analysis. IEEE Transactions on Neural Networks, 22(2), 199–210.CrossRef Pan, S. J., Tsang, I. W., Kwok, J. T., & Yang, Q. (2011). Domain adaptation via transfer component analysis. IEEE Transactions on Neural Networks, 22(2), 199–210.CrossRef
52.
go back to reference Perez Rodriguez, J. S. (2016). Distributed cognitive rat selection in 5G heterogeneous networks: A machine learning approach, Ph.D. Thesis. Albuquerque, New Mexico: University of New Mexico. Perez Rodriguez, J. S. (2016). Distributed cognitive rat selection in 5G heterogeneous networks: A machine learning approach, Ph.D. Thesis. Albuquerque, New Mexico: University of New Mexico.
53.
go back to reference Piro, G., Grieco, L. A., Boggia, G., Fortuna, R., & Camarda, P. (2011). Two-level downlink scheduling for real-time multimedia services in LTE networks. IEEE Transactions on Multimedia, 13(5), 1052–1065.CrossRef Piro, G., Grieco, L. A., Boggia, G., Fortuna, R., & Camarda, P. (2011). Two-level downlink scheduling for real-time multimedia services in LTE networks. IEEE Transactions on Multimedia, 13(5), 1052–1065.CrossRef
54.
go back to reference Prabhu, V., & Nagaraja, G. (2014). Survey, classification and future direction for packet scheduling in 4G networks to provide quality of service. IJRCCT, 3(10), 1334–1339. Prabhu, V., & Nagaraja, G. (2014). Survey, classification and future direction for packet scheduling in 4G networks to provide quality of service. IJRCCT, 3(10), 1334–1339.
55.
go back to reference Prasad, N., Zhang, H., Zhu, H., & Rangarajan, S. (2014). Multiuser scheduling in the 3GPP LTE cellular uplink. IEEE Transactions on Mobile Computing, 13(1), 130–145.CrossRef Prasad, N., Zhang, H., Zhu, H., & Rangarajan, S. (2014). Multiuser scheduling in the 3GPP LTE cellular uplink. IEEE Transactions on Mobile Computing, 13(1), 130–145.CrossRef
56.
go back to reference Rossi, M., Benatti, S., Farella, E., & Benini, L. (2015). Hybrid EMG classifier based on HMM and SVM for hand gesture recognition in prosthetics. In IEEE international conference on industrial technology (ICIT), IEEE (pp. 1700–1705). Rossi, M., Benatti, S., Farella, E., & Benini, L. (2015). Hybrid EMG classifier based on HMM and SVM for hand gesture recognition in prosthetics. In IEEE international conference on industrial technology (ICIT), IEEE (pp. 1700–1705).
57.
go back to reference Secci, S., Pujolle, G., Nguyen, T. M. T., & Nguyen, S. C. (2014). Performance-cost trade-off strategic evaluation of multipath TCP communications. IEEE Transactions on Network and Service Management, 11(2), 250–263.CrossRef Secci, S., Pujolle, G., Nguyen, T. M. T., & Nguyen, S. C. (2014). Performance-cost trade-off strategic evaluation of multipath TCP communications. IEEE Transactions on Network and Service Management, 11(2), 250–263.CrossRef
58.
go back to reference Sedlmair, M., Munzner, T., & Tory, M. (2013). Empirical guidance on scatterplot and dimension reduction technique choices. IEEE Transactions on Visualization and Computer Graphics, 19(12), 2634–2643.CrossRef Sedlmair, M., Munzner, T., & Tory, M. (2013). Empirical guidance on scatterplot and dimension reduction technique choices. IEEE Transactions on Visualization and Computer Graphics, 19(12), 2634–2643.CrossRef
59.
go back to reference Tabakhi, S., & Moradi, P. (2015). Relevance–redundancy feature selection based on ant colony optimization. Pattern Recognition, 48(9), 2798–2811.CrossRef Tabakhi, S., & Moradi, P. (2015). Relevance–redundancy feature selection based on ant colony optimization. Pattern Recognition, 48(9), 2798–2811.CrossRef
60.
go back to reference Tennant, M., Stahl, F., Rana, O., & Gomes, J. B. (2017). Scalable real-time classification of data streams with concept drift. Future Generation Computer Systems, 75, 187–199.CrossRef Tennant, M., Stahl, F., Rana, O., & Gomes, J. B. (2017). Scalable real-time classification of data streams with concept drift. Future Generation Computer Systems, 75, 187–199.CrossRef
61.
go back to reference Tiwana, M. I., & Tiwana, M. I. (2014). A novel framework of automated RRM for LTE son using data mining: Application to LTE mobility. Journal of Network and Systems Management, 22(2), 235–258.CrossRef Tiwana, M. I., & Tiwana, M. I. (2014). A novel framework of automated RRM for LTE son using data mining: Application to LTE mobility. Journal of Network and Systems Management, 22(2), 235–258.CrossRef
62.
go back to reference Unler, A., Murat, A., & Chinnam, R. B. (2011). mr2PSO: A maximum relevance minimum redundancy feature selection method based on swarm intelligence for support vector machine classification. Information Sciences, 181(20), 4625–4641.CrossRef Unler, A., Murat, A., & Chinnam, R. B. (2011). mr2PSO: A maximum relevance minimum redundancy feature selection method based on swarm intelligence for support vector machine classification. Information Sciences, 181(20), 4625–4641.CrossRef
63.
go back to reference Xu, Y., Yue, G., & Mao, S. (2014). User grouping for massive MIMO in FDD systems: New design methods and analysis. IEEE Access, 2, 947–959.CrossRef Xu, Y., Yue, G., & Mao, S. (2014). User grouping for massive MIMO in FDD systems: New design methods and analysis. IEEE Access, 2, 947–959.CrossRef
64.
go back to reference Xue, B., Zhang, M., & Browne, W. N. (2013). Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE transactions on cybernetics, 43(6), 1656–1671.CrossRef Xue, B., Zhang, M., & Browne, W. N. (2013). Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE transactions on cybernetics, 43(6), 1656–1671.CrossRef
65.
go back to reference Yu, J., Lee, H., Im, Y., Kim, M.-S., & Park, D. (2010). Real-time classification of internet application traffic using a hierarchical multi-class SVM. KSII Transactions on Internet & Information Systems, 4(5), 859–876. Yu, J., Lee, H., Im, Y., Kim, M.-S., & Park, D. (2010). Real-time classification of internet application traffic using a hierarchical multi-class SVM. KSII Transactions on Internet & Information Systems, 4(5), 859–876.
66.
go back to reference Zhang, Y., Gong, D., Hu, Y., & Zhang, W. (2015). Feature selection algorithm based on bare bones particle swarm optimization. Neurocomputing, 148, 150–157.CrossRef Zhang, Y., Gong, D., Hu, Y., & Zhang, W. (2015). Feature selection algorithm based on bare bones particle swarm optimization. Neurocomputing, 148, 150–157.CrossRef
67.
go back to reference Zhao, M., Fu, C., Ji, L., Tang, K., & Zhou, M. (2011). Feature selection and parameter optimization for support vector machines: A new approach based on genetic algorithm with feature chromosomes. Expert Systems with Applications, 38(5), 5197–5204.CrossRef Zhao, M., Fu, C., Ji, L., Tang, K., & Zhou, M. (2011). Feature selection and parameter optimization for support vector machines: A new approach based on genetic algorithm with feature chromosomes. Expert Systems with Applications, 38(5), 5197–5204.CrossRef
68.
go back to reference Zhenqi, S., Haifeng, Y., Xuefen, C., & Hongxia, L. (2013). Research on uplink scheduling algorithm of massive M2M and H2H services in LTE. In IET international conference on Information and communications technologies (IETICT 2013), IET (pp. 365–369). Zhenqi, S., Haifeng, Y., Xuefen, C., & Hongxia, L. (2013). Research on uplink scheduling algorithm of massive M2M and H2H services in LTE. In IET international conference on Information and communications technologies (IETICT 2013), IET (pp. 365–369).
69.
go back to reference Zolotukhin, M. (2014). On data mining applications in mobile networking and network security. Jyväskylä studies in computing, 189. Zolotukhin, M. (2014). On data mining applications in mobile networking and network security. Jyväskylä studies in computing, 189.
Metadata
Title
A Survey on Long Term Evolution Scheduling in Data Mining
Authors
Divya Mohan
Geetha Mary Amalanathan
Publication date
07-08-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5909-9

Other articles of this Issue 3/2018

Wireless Personal Communications 3/2018 Go to the issue