Search results for "Network"

showing 10 items of 7718 documents

Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures

2015

Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…

business.industryComputer scienceController (computing)Distributed computingFloodlight020206 networking & telecommunicationsCloud computing02 engineering and technologycomputer.software_genreNetwork traffic controlVirtual machineCloud testing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArchitecturebusinessSoftware-defined networkingcomputerComputer network2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
researchProduct

Repair Mechanisms for Broadcast Transmissions in Hybrid Cellular & DVB-H Systems

2006

This paper proposes a framework for investigating potential infrastructure cost savings in hybrid cellular and DVB- H systems by performing efficient error repair of broadcast transmissions. The main idea is to reuse as much as possible the existing network infrastructure to provide mobile TV services. The cellular system is not only employed to collect information, but also to send repair data to the users whose conditions are temporarily affected by noise, interference and fading. To enable an easy and efficient implementation of the repair mechanisms we adopt the use of application layer - forward error correction (AL-FEC) with digital fountain coding.

business.industryComputer scienceDVB-HMobile televisionDigital Video BroadcastingFadingForward error correctionReusebusinessApplication layerComputer networkCoding (social sciences)2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems

2009

In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…

business.industryComputer scienceDVB-HMobile televisionReal-time computingData_CODINGANDINFORMATIONTHEORYApplication layerlaw.inventionlawInternet ProtocolDigital Video BroadcastingMedia TechnologyLink layerForward error correctionElectrical and Electronic EngineeringbusinessAccess timeComputer networkIEEE Transactions on Broadcasting
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Convolutional Long Short-Term Memory Network for Multitemporal Cloud Detection Over Landmarks

2019

In this work, we propose to exploit both the temporal and spatial correlations in Earth observation satellite images through deep learning methods. In particular, the combination of a U-Net convolutional neural network together with a convolutional long short-term memory (LSTM) layer is proposed. This model is applied for cloud detection on MSG/SEVIRI image time series over selected landmarks. Implementation details are provided and our proposal is compared against a standard SVM and a U-Net without the convolutional LSTM layer but including temporal information too. Experimental results show that this combination of networks exploits both the spatial and temporal dependence and provides st…

business.industryComputer scienceDeep learning0211 other engineering and technologiesCloud detectionPattern recognition02 engineering and technology010501 environmental sciences01 natural sciencesConvolutional neural networkImage (mathematics)Support vector machineLong short term memoryArtificial intelligenceLayer (object-oriented design)business021101 geological & geomatics engineering0105 earth and related environmental sciencesIGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium
researchProduct

Infantile Hemangioma Detection using Deep Learning

2020

Infantile hemangiomas are the most common type of benign tumor which appear in the first weeks of life. As currently there is no robust protocol to monitor and assess the hemangioma status, this study proposes a preliminary method to detect the lesion. Therefore, in this paper we describe a hemangiomas classifier based on a linear convolutional neural network architecture. The challenge was to achieve a good classification using a relatively small internal database of 240 images from 40 different patients. The results are promising as the CNN performance evaluation showed a level of accuracy on the test set of 93.84%. Five metrics were calculated to assess the proposed model performances: a…

business.industryComputer scienceDeep learning05 social sciencesEarly detection050801 communication & media studiesPattern recognitionmedicine.diseaseConvolutional neural networkBenign tumorHemangiomaLesion0508 media and communicationsTest set0502 economics and businessInfantile hemangiomamedicine050211 marketingArtificial intelligencemedicine.symptombusinessClassifier (UML)2020 13th International Conference on Communications (COMM)
researchProduct

Proposition of Convolutional Neural Network Based System for Skin Cancer Detection

2019

Skin cancer automated diagnosis tools play a vital role in timely screening, helping dermatologists focus on melanoma cases. Best arts on automated melanoma screening use deep learning-based approaches, especially deep convolutional neural networks (CNN) to improve performances. Because of the large number of parameters that could be involved during training in CNN many training samples are needed to avoid overfitting problem. Gabor filtering can efficiently extract spatial information including edges and textures, which may reduce the features extraction burden to CNN. In this paper, we proposed a Gabor Convolutional Network (GCN) model to improve the performance of automated diagnosis of …

business.industryComputer scienceDeep learningFeature extractionPattern recognition02 engineering and technologyFilter (signal processing)OverfittingConvolutional neural network030218 nuclear medicine & medical imaging03 medical and health sciences0302 clinical medicineGabor filter0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessFocus (optics)Spatial analysis2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)
researchProduct

Combination Of Handcrafted And Deep Learning-Based Features For 3d Mesh Quality Assessment

2020

We propose in this paper a novel objective method to evaluate the perceived visual quality of 3D meshes. The proposed method in no-reference, it relies only on the distorted mesh for the quality estimation. It is based on a pre-trained convolutional neural network (i.e VGG to extract features from the distorted mesh) and handcrafted features extracted directly from the 3D mesh (i.e curvature and dihedral angle). A General Regression Neural Network (GRNN) is used to learn the statistical parameters of the feature vectors and estimate the quality score. Experimental results from for subjective databases (LIRIS masking, LIRIS/EPFL generalpurpose, UWB compression and LEETA simplification) and c…

business.industryComputer scienceDeep learningFeature vectorFeature extraction020207 software engineeringPattern recognition02 engineering and technologyCurvatureConvolutional neural networkVisualizationMetric (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshArtificial intelligencebusiness2020 IEEE International Conference on Image Processing (ICIP)
researchProduct

No-reference mesh visual quality assessment via ensemble of convolutional neural networks and compact multi-linear pooling

2020

Abstract Blind or No reference quality evaluation is a challenging issue since it is done without access to the original content. In this work, we propose a method based on deep learning for the mesh visual quality assessment without reference. For a given 3D model, we first compute its mesh saliency. Then, we extract views from the 3D mesh and the corresponding mesh saliency. After that, the views are split into small patches that are filtered using a saliency threshold. Only the salient patches are selected and used as input data. After that, three pre-trained deep convolutional neural networks are employed for feature learning: VGG, AlexNet, and ResNet. Each network is fine-tuned and pro…

business.industryComputer scienceDeep learningFeature vectorPoolingPattern recognition02 engineering and technology01 natural sciencesConvolutional neural networkResidual neural networkArtificial IntelligenceFeature (computer vision)0103 physical sciencesSignal Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligence010306 general physicsbusinessFeature learningSoftwarePattern Recognition
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct