Search results for "NETWORKS"

showing 10 items of 3260 documents

Convolutional neural networks in skin cancer detection using spatial and spectral domain

2019

Skin cancers are world wide deathly health problem, where significant life and cost savings could be achieved if detection of cancer can be done in early phase. Hypespectral imaging is prominent tool for non-invasive screening. In this study we compare how use of both spectral and spatial domain increase classification performance of convolutional neural networks. We compare five different neural network architectures for real patient data. Our models gain same or slightly better positive predictive value as clinicians. Towards more general and reliable model more data is needed and collection of training data should be systematic. peerReviewed

ta113Training setskin cancerArtificial neural networkComputer sciencebusiness.industryspektrikuvausHyperspectral imagingspectral imagingSpectral domainPattern recognitionneuroverkotmedicine.diseaseneural networksWorld wideConvolutional neural networkihosyöpämedicineArtificial intelligenceSkin cancerEarly phasebusinessta217
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Context-aware data caching for 5G heterogeneous small cells networks

2016

In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…

ta113context awareta213Computer sciencebusiness.industryQuality of servicematching05 social sciences050801 communication & media studies020206 networking & telecommunicationssmall cell networks02 engineering and technologycontent cachingSmart CacheBase station0508 media and communicationsServer0202 electrical engineering electronic engineering information engineeringLeverage (statistics)CacheSmall cellbusinessComputer network
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

The influence of dataset size on the performance of cell outage detection approach in LTE-A networks

2015

The configuration and maintenance of constantly evolving mobile cellular networks are getting more and more complex and hence expensive. Self-Organizing Networks (SON) concept is an umbrella term for the set of automated solutions for network operations proposed by 3rd Generation Partnership Project (3GPP) group. Automated cell outage detection is one of the components of SON functionality. In early studies our research group developed data-driven approach for the detection of malfunctioning cells. In this paper we investigate the performance of the proposed solution as a function of the density of active users and the size of observation interval. The evaluation is conducted in Long Term E…

ta113ta213Computer sciencebusiness.industrydatasetsReal-time computingLTE-A networkssizeMaintenance engineeringNetwork operations centerTerm (time)LTE AdvancedHandoverCellular networkMobile telephonybusinessRandom accessComputer network
researchProduct

Effects of Temperature and Humidity on Radio Signal Strength in Outdoor Wireless Sensor Networks

2015

Many wireless sensor networks operating outdoors are exposed to changing weather conditions, which may cause severe degradation in system performance. Therefore, it is essential to explore the factors affecting radio link quality in order to mitigate their impact and to adapt to varying conditions. In this paper, we study the effects of temperature and humidity on radio signal strength in outdoor wireless sensor networks. Experimental measurements were performed using Atmel ZigBit 2.4GHz wireless modules, both in summer and wintertime. We employed all the radio channels specified by IEEE 802.15.4 for 2.4GHz ISM frequency band with two transmit power levels. The results show that changes in …

ta113ta213radio signal strengthComputer scienceFrequency bandbusiness.industryRadio Link ProtocolhumiditytemperatureTransmitter power outputTemperature measurementlaw.inventionlawMobile wireless sensor networkElectronic engineeringWirelesslämpötilaTelecommunicationsbusinesswireless sensor networksWireless sensor networkDiversity scheme
researchProduct

Towards proactive context-aware self-healing for 5G networks

2017

In this paper, we suggest a new research direction and a future vision for Self-Healing (SH) in Self-Organizing Networks (SONs). The problem we wish to solve is that traditional SH solutions may not be sufficient for the future needs of cellular network management because of their reactive nature, i.e., they start recovering after detecting already occurred faults instead of preparing for possible future faults in a pre-emptive manner. The detection delays are especially problematic with regard to the zero latency requirements of 5G networks. To address this problem, existing SONs need to be upgraded from reactive to proactive response. One of the dimensions in SH research is to employ more…

ta213Computer Networks and CommunicationsComputer science020206 networking & telecommunicationsSelf-organizing network02 engineering and technologyuser contextcontext aware systemComputer securitycomputer.software_genre5G networksSelf-healing0202 electrical engineering electronic engineering information engineeringCellular networkself-organizing networkself-healing020201 artificial intelligence & image processingcomputer5G
researchProduct

Multi-hop D2D Communications with Network Coding : From A Performance Perspective

2019

Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communication system. In the system, toward jointly considering the impact of interference and network traffic conditions on the quality of D2D communications, various channel fading models and traffic models are investigated, and the packet loss probability of D2D links is meticulously computed using these models. With the packet loss probability of D2D links, the general closed-form expressions of end-to-end packet loss probability (E2EPLP) of the system with the presence (or absence) o…

ta213Computer Networks and Communicationsbusiness.industryComputer sciencetraffic modelAerospace Engineeringnetwork codingmatkaviestinverkotCommunications systemperformance evaluationSpread spectrumlangaton tiedonsiirtomobiililaitteetPacket lossLinear network codingAutomotive EngineeringFadingElectrical and Electronic Engineeringbusinessmulti-hop D2D communicationCommunication channelComputer network
researchProduct