Search results for "layer"
showing 10 items of 2667 documents
Multiple Classifiers and Data Fusion for Robust Diagnosis of Gearbox Mixed Faults
2019
Detection and isolation of single and mixed faults in a gearbox are very important to enhance the system reliability, lifetime, and service availability. This paper proposes a hybrid learning algorithm, consisting of multilayer perceptron (MLP)- and convolutional neural network (CNN)-based classifiers, for diagnosis of gearbox mixed faults. Domain knowledge features are required to train the MLP classifier, while the CNN classifier can learn features itself, allowing to reduce the required knowledge features for the counterpart. Vibration data from an experimental setup with gearbox mixed faults is used to validate the effectiveness of the algorithms and compare them with conventional metho…
Repair Mechanisms for Broadcast Transmissions in Hybrid Cellular & DVB-H Systems
2006
This paper proposes a framework for investigating potential infrastructure cost savings in hybrid cellular and DVB- H systems by performing efficient error repair of broadcast transmissions. The main idea is to reuse as much as possible the existing network infrastructure to provide mobile TV services. The cellular system is not only employed to collect information, but also to send repair data to the users whose conditions are temporarily affected by noise, interference and fading. To enable an easy and efficient implementation of the repair mechanisms we adopt the use of application layer - forward error correction (AL-FEC) with digital fountain coding.
Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems
2009
In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…
Convolutional Long Short-Term Memory Network for Multitemporal Cloud Detection Over Landmarks
2019
In this work, we propose to exploit both the temporal and spatial correlations in Earth observation satellite images through deep learning methods. In particular, the combination of a U-Net convolutional neural network together with a convolutional long short-term memory (LSTM) layer is proposed. This model is applied for cloud detection on MSG/SEVIRI image time series over selected landmarks. Implementation details are provided and our proposal is compared against a standard SVM and a U-Net without the convolutional LSTM layer but including temporal information too. Experimental results show that this combination of networks exploits both the spatial and temporal dependence and provides st…
A one class classifier for Signal identification: a biological case study
2008
The paper describes an application of a one-class KNN to identify different signal patterns embedded in a noise structured background. The problem become harder whenever only one pattern is well represented in the signal, in such cases one class classifier techniques are more indicated. The classification phase is applied after a preprocessing phase based on a Multi Layer Model (MLM) that provides a preliminary signal segmentation in an interval feature space. The one-class KNN has been tested on synthetic data that simulate microarray data for the identification of nucleosomes and linker regions across DNA. Results have shown a good recognition rate on synthetic data for nucleosome and lin…
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
2017
With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…
Interference Estimation in IEEE 802.11 Networks
2010
This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…
Sub-symbolic Mapping of Cyc Microtheories in Data-Driven “Conceptual” Spaces
2007
The presented work aims to combine statistical and cognitive-oriented approaches with symbolic ones so that a conceptual similarity relationship layer can be added to a Cyc KB microtheory. Given a specific microtheory, a LSA-inspired conceptual space is inferred from a corpus of texts created using both ad hoc extracted pages from the Wikipedia repository and the built-in comments about the concepts of the specific Cyc microtheory. Each concept is projected in the conceptual space and the desired layer of subsymbolic relationships between concepts is created. This procedure can help a user in finding the concepts that are "sub-symbolically conceptually related" to a new concept that he want…
Demo - Dynamic Adaptations of WiFi Channel Widths Without TX/RX Coordination
2017
Most modern standards for wireless communications support physical layer adaptations, in terms of dynamic selection of channel central frequency, transmission power, modulation format, etc., in order to increase link robustness under time-varying propagation and interference conditions. In this demo, we demonstrate that another powerful solution for extending physical layer flexibility in OFDM-based technologies is the dynamic adaptation of the channel width. Although some standards already define the possibility of utilizing multiple channel widths (e.g. 20MHz, 10MHz, 5MHz for IEEE 802.11a standards), such an utilization is limited to a static configuration of a value defined during the ne…
Side Effects of Ambient Noise Immunity Techniques on Outdoor IEEE 802.11 Deployments
2008
A very common conclusion of many experimental studies about IEEE 802.11 outdoor network deployments is that their poor performance results derive from the unfavorable interference and multi-path signals in which the WLAN-cards are required to operate. Goal of this paper is to show that this condition does not always hold, and unexpected and inaccurated PHY layer implementations can be a primary cause of packet losses. With the support of extensive measurement campaigns led in our campus, we provide the performance evidence that IEEE 802.11 outdoor performance impairments are strongly affected by proprietary interference mitigation techniques that adaptively adjust the WLAN-card receiver sen…