Search results for "Network"
showing 10 items of 7718 documents
Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures
2015
Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…
Repair Mechanisms for Broadcast Transmissions in Hybrid Cellular & DVB-H Systems
2006
This paper proposes a framework for investigating potential infrastructure cost savings in hybrid cellular and DVB- H systems by performing efficient error repair of broadcast transmissions. The main idea is to reuse as much as possible the existing network infrastructure to provide mobile TV services. The cellular system is not only employed to collect information, but also to send repair data to the users whose conditions are temporarily affected by noise, interference and fading. To enable an easy and efficient implementation of the repair mechanisms we adopt the use of application layer - forward error correction (AL-FEC) with digital fountain coding.
Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems
2009
In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…
Convolutional Long Short-Term Memory Network for Multitemporal Cloud Detection Over Landmarks
2019
In this work, we propose to exploit both the temporal and spatial correlations in Earth observation satellite images through deep learning methods. In particular, the combination of a U-Net convolutional neural network together with a convolutional long short-term memory (LSTM) layer is proposed. This model is applied for cloud detection on MSG/SEVIRI image time series over selected landmarks. Implementation details are provided and our proposal is compared against a standard SVM and a U-Net without the convolutional LSTM layer but including temporal information too. Experimental results show that this combination of networks exploits both the spatial and temporal dependence and provides st…
Infantile Hemangioma Detection using Deep Learning
2020
Infantile hemangiomas are the most common type of benign tumor which appear in the first weeks of life. As currently there is no robust protocol to monitor and assess the hemangioma status, this study proposes a preliminary method to detect the lesion. Therefore, in this paper we describe a hemangiomas classifier based on a linear convolutional neural network architecture. The challenge was to achieve a good classification using a relatively small internal database of 240 images from 40 different patients. The results are promising as the CNN performance evaluation showed a level of accuracy on the test set of 93.84%. Five metrics were calculated to assess the proposed model performances: a…
Proposition of Convolutional Neural Network Based System for Skin Cancer Detection
2019
Skin cancer automated diagnosis tools play a vital role in timely screening, helping dermatologists focus on melanoma cases. Best arts on automated melanoma screening use deep learning-based approaches, especially deep convolutional neural networks (CNN) to improve performances. Because of the large number of parameters that could be involved during training in CNN many training samples are needed to avoid overfitting problem. Gabor filtering can efficiently extract spatial information including edges and textures, which may reduce the features extraction burden to CNN. In this paper, we proposed a Gabor Convolutional Network (GCN) model to improve the performance of automated diagnosis of …
Combination Of Handcrafted And Deep Learning-Based Features For 3d Mesh Quality Assessment
2020
We propose in this paper a novel objective method to evaluate the perceived visual quality of 3D meshes. The proposed method in no-reference, it relies only on the distorted mesh for the quality estimation. It is based on a pre-trained convolutional neural network (i.e VGG to extract features from the distorted mesh) and handcrafted features extracted directly from the 3D mesh (i.e curvature and dihedral angle). A General Regression Neural Network (GRNN) is used to learn the statistical parameters of the feature vectors and estimate the quality score. Experimental results from for subjective databases (LIRIS masking, LIRIS/EPFL generalpurpose, UWB compression and LEETA simplification) and c…
No-reference mesh visual quality assessment via ensemble of convolutional neural networks and compact multi-linear pooling
2020
Abstract Blind or No reference quality evaluation is a challenging issue since it is done without access to the original content. In this work, we propose a method based on deep learning for the mesh visual quality assessment without reference. For a given 3D model, we first compute its mesh saliency. Then, we extract views from the 3D mesh and the corresponding mesh saliency. After that, the views are split into small patches that are filtered using a saliency threshold. Only the salient patches are selected and used as input data. After that, three pre-trained deep convolutional neural networks are employed for feature learning: VGG, AlexNet, and ResNet. Each network is fine-tuned and pro…
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.