Search results for "layer"

showing 10 items of 2667 documents

Multiple Classifiers and Data Fusion for Robust Diagnosis of Gearbox Mixed Faults

2019

Detection and isolation of single and mixed faults in a gearbox are very important to enhance the system reliability, lifetime, and service availability. This paper proposes a hybrid learning algorithm, consisting of multilayer perceptron (MLP)- and convolutional neural network (CNN)-based classifiers, for diagnosis of gearbox mixed faults. Domain knowledge features are required to train the MLP classifier, while the CNN classifier can learn features itself, allowing to reduce the required knowledge features for the counterpart. Vibration data from an experimental setup with gearbox mixed faults is used to validate the effectiveness of the algorithms and compare them with conventional metho…

business.industryComputer science020208 electrical & electronic engineeringFeature extractionPattern recognition02 engineering and technologySensor fusionConvolutional neural networkComputer Science ApplicationsStatistical classificationControl and Systems EngineeringRobustness (computer science)Multilayer perceptron0202 electrical engineering electronic engineering information engineeringArtificial intelligenceElectrical and Electronic EngineeringbusinessClassifier (UML)Information SystemsIEEE Transactions on Industrial Informatics
researchProduct

Repair Mechanisms for Broadcast Transmissions in Hybrid Cellular & DVB-H Systems

2006

This paper proposes a framework for investigating potential infrastructure cost savings in hybrid cellular and DVB- H systems by performing efficient error repair of broadcast transmissions. The main idea is to reuse as much as possible the existing network infrastructure to provide mobile TV services. The cellular system is not only employed to collect information, but also to send repair data to the users whose conditions are temporarily affected by noise, interference and fading. To enable an easy and efficient implementation of the repair mechanisms we adopt the use of application layer - forward error correction (AL-FEC) with digital fountain coding.

business.industryComputer scienceDVB-HMobile televisionDigital Video BroadcastingFadingForward error correctionReusebusinessApplication layerComputer networkCoding (social sciences)2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems

2009

In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…

business.industryComputer scienceDVB-HMobile televisionReal-time computingData_CODINGANDINFORMATIONTHEORYApplication layerlaw.inventionlawInternet ProtocolDigital Video BroadcastingMedia TechnologyLink layerForward error correctionElectrical and Electronic EngineeringbusinessAccess timeComputer networkIEEE Transactions on Broadcasting
researchProduct

Convolutional Long Short-Term Memory Network for Multitemporal Cloud Detection Over Landmarks

2019

In this work, we propose to exploit both the temporal and spatial correlations in Earth observation satellite images through deep learning methods. In particular, the combination of a U-Net convolutional neural network together with a convolutional long short-term memory (LSTM) layer is proposed. This model is applied for cloud detection on MSG/SEVIRI image time series over selected landmarks. Implementation details are provided and our proposal is compared against a standard SVM and a U-Net without the convolutional LSTM layer but including temporal information too. Experimental results show that this combination of networks exploits both the spatial and temporal dependence and provides st…

business.industryComputer scienceDeep learning0211 other engineering and technologiesCloud detectionPattern recognition02 engineering and technology010501 environmental sciences01 natural sciencesConvolutional neural networkImage (mathematics)Support vector machineLong short term memoryArtificial intelligenceLayer (object-oriented design)business021101 geological & geomatics engineering0105 earth and related environmental sciencesIGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium
researchProduct

A one class classifier for Signal identification: a biological case study

2008

The paper describes an application of a one-class KNN to identify different signal patterns embedded in a noise structured background. The problem become harder whenever only one pattern is well represented in the signal, in such cases one class classifier techniques are more indicated. The classification phase is applied after a preprocessing phase based on a Multi Layer Model (MLM) that provides a preliminary signal segmentation in an interval feature space. The one-class KNN has been tested on synthetic data that simulate microarray data for the identification of nucleosomes and linker regions across DNA. Results have shown a good recognition rate on synthetic data for nucleosome and lin…

business.industryComputer scienceFeature vectorOne-class classificationPattern recognitionSegmentationArtificial intelligencebusinessMulti Layer Method One Class classification Bioinformatics Nucleosome Positioning.Classifier (UML)Synthetic data
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

Interference Estimation in IEEE 802.11 Networks

2010

This article describes a technique for distinguishing and quantifying medium access control (MAC) and physical layer (PHY) interference in error-prone 802.11 networks. This technique, is fully distributed, allowing each station to estimate interference individually. The estimator is based on an extended Kalman filter coupled to a mechanism for revealing abrupt changes in state. The network state is a vector of two components, representing PHY interference, expressed in terms of channel-error rate, and MAC interference. Two distinct state models are considered. When PHY interference can be assumed to be constant for all stations, network congestion is expressed by the number of competing ter…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerKalman filterInterference (wave propagation)Network congestionExtended Kalman filterIEEE 802.11Control and Systems EngineeringPHYModeling and SimulationComputer Science::Networking and Internet ArchitectureElectronic engineeringWirelessElectrical and Electronic EngineeringbusinessKalman FilterComputer Science::Information Theory
researchProduct

Sub-symbolic Mapping of Cyc Microtheories in Data-Driven “Conceptual” Spaces

2007

The presented work aims to combine statistical and cognitive-oriented approaches with symbolic ones so that a conceptual similarity relationship layer can be added to a Cyc KB microtheory. Given a specific microtheory, a LSA-inspired conceptual space is inferred from a corpus of texts created using both ad hoc extracted pages from the Wikipedia repository and the built-in comments about the concepts of the specific Cyc microtheory. Each concept is projected in the conceptual space and the desired layer of subsymbolic relationships between concepts is created. This procedure can help a user in finding the concepts that are "sub-symbolically conceptually related" to a new concept that he want…

business.industryComputer scienceSimilarity (psychology)Conceptual spaceArtificial intelligenceOntology (information science)Layer (object-oriented design)businesscomputer.software_genrecomputerNatural language processingData-driven
researchProduct

Demo - Dynamic Adaptations of WiFi Channel Widths Without TX/RX Coordination

2017

Most modern standards for wireless communications support physical layer adaptations, in terms of dynamic selection of channel central frequency, transmission power, modulation format, etc., in order to increase link robustness under time-varying propagation and interference conditions. In this demo, we demonstrate that another powerful solution for extending physical layer flexibility in OFDM-based technologies is the dynamic adaptation of the channel width. Although some standards already define the possibility of utilizing multiple channel widths (e.g. 20MHz, 10MHz, 5MHz for IEEE 802.11a standards), such an utilization is limited to a static configuration of a value defined during the ne…

business.industryOrthogonal frequency-division multiplexingComputer scienceTransmitterPhysical layer020206 networking & telecommunications02 engineering and technologyIEEE 802.11Cognitive radioRobustness (computer science)0202 electrical engineering electronic engineering information engineeringElectronic engineeringWirelessCenter frequencybusinessComputer networkProceedings of the 23rd Annual International Conference on Mobile Computing and Networking - MobiCom 17
researchProduct

Side Effects of Ambient Noise Immunity Techniques on Outdoor IEEE 802.11 Deployments

2008

A very common conclusion of many experimental studies about IEEE 802.11 outdoor network deployments is that their poor performance results derive from the unfavorable interference and multi-path signals in which the WLAN-cards are required to operate. Goal of this paper is to show that this condition does not always hold, and unexpected and inaccurated PHY layer implementations can be a primary cause of packet losses. With the support of extensive measurement campaigns led in our campus, we provide the performance evidence that IEEE 802.11 outdoor performance impairments are strongly affected by proprietary interference mitigation techniques that adaptively adjust the WLAN-card receiver sen…

business.industryOrthogonal frequency-division multiplexingNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingAmbient noise levelPhysical layernoise immunityWLANNoiseIEEE 802.11Interference (communication)Wireless lanWirelessbusinessComputer networkIEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
researchProduct