0000000000077530

AUTHOR

Francesca Cuomo

0000-0002-1166-6970

showing 8 related works from this author

Evolution of Free Amino Acids, Histamine and Volatile Compounds in the Italian Anchovies (Engraulis encrasicolus L.) Sauce at Different Ripening Times

2022

In this study, the evolution of the safety, nutritional, and volatile profile of a traditional Italian anchovy sauce with protected designation of origin (PDO), called “colatura di alici di Cetara”, is investigated after 12, 24, and 48 months of aging in wooden barrels. Some physicochemical parameters, free amino acids, volatile compounds, and histamine contents were evaluated during the aging of the samples. Glutamate, which together with aspartate is responsible for the umami taste, was the predominant free amino acid in the tested fish sauce, with a significant increase during the 48 months of maturation. The total amino acid content of the anchovy sauce increased from 24 to …

fermented seasoningfood safetybiogenic amines fermented seasoning fish sauce food safety nutritional qualityHealth (social science)fish sauce; food safety; nutritional quality; biogenic amines; fermented seasoningfish saucenutritional qualitybiogenic aminesPlant ScienceHealth Professions (miscellaneous)Microbiologybiogenic amines; fermented seasoning; fish sauce; food safety; nutritional qualityFood ScienceFoods; Volume 12; Issue 1; Pages: 126
researchProduct

Exploratory approach for network behavior clustering in LoRaWAN

2021

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as I…

IoTGeneral Computer ScienceComputer sciencek-meansReliability (computer networking)02 engineering and technologyLoRaMachine LearningHome automation0202 electrical engineering electronic engineering information engineeringCluster AnalysisWirelessCluster analysisIoT LoRa LoRaWAN Machine Learning k-means Anomaly Detection Cluster AnalysisNetwork packetbusiness.industry020206 networking & telecommunicationsIoT; LoRa; LoRaWAN; Machine Learning; k-means; Anomaly Detection; Cluster AnalysisLoRaWANWireless network interface controllerScalabilityAnomaly Detection020201 artificial intelligence & image processingAnomaly detectionbusinessComputer networkJournal of Ambient Intelligence and Humanized Computing
researchProduct

Discovery privacy threats via device de-anonymization in LoRaWAN

2021

LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…

Information privacyIoTDe-anonymizationde-anonymizationsComputer scienceEmerging technologiesComputer Networks and CommunicationsInternet of ThingsDevice identificationcomputer.software_genreComputer securityprivacyLoRaSecurity and privacyUnique identifierDe-anonymizationLoRaWAN; Security; privacy; de-anonymizationsLorawanApplication serverNetwork packetProbabilistic logicIdentification (information)internet of things; lora; lorawan; security; privacy; network optimizationSecuritycomputerNetwork optimizationComputer Communications
researchProduct

A Clustering approach for profiling LoRaWAN IoT devices

2019

Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…

050101 languages & linguisticsIoTComputer scienceIoT; LoRa; LoRaWAN; machine learning; k-means; anomaly detection; cluster analysisk-means02 engineering and technologyLoRaSilhouette0202 electrical engineering electronic engineering information engineeringProfiling (information science)Wireless0501 psychology and cognitive sciencesCluster analysisbusiness.industryNetwork packetSettore ING-INF/03 - Telecomunicazioni05 social sciencesk-means clusteringanomaly detectionLoRaWANmachine learning020201 artificial intelligence & image processingAnomaly detectionInternet of ThingsbusinessComputer networkcluster analysis
researchProduct

Leakage Detection via Edge Processing in LoRaWAN-based Smart Water Distribution Networks

2022

The optimization and digitalization of Water Distribution Networks (WDNs) are becoming key objectives in our modern society. Indeed, WDNs are typically old, worn and obsolete. These inadequate conditions of the infrastructures lead to significant water loss due to leakages inside pipes, junctions and nodes. It has been measured that in Europe the average value of lost water is about 26 %. Leakage control in current WDNs is typically passive, repairing leaks only when they are visible. Emerging Low Power Wide Area Network (LPWAN) technologies, and especially IoT ones, can help monitor water consumption and automatically detect leakages. In this context, LoRaWAN can be the right way to deploy…

Machine Learning Water Distribution Network Leakage Detection IoT LoRaWAN LoRa DecisionTree Classificator
researchProduct

Predicting lorawan behavior. How machine learning can help

2020

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance (and if and how they can help). To this aim, we describe a methodology to process LoRaWAN packets a…

IoTComputer Networks and CommunicationsComputer scienceDecision treeChannel occupancy; cluster analysis; IoT; LoRa; LoRaWAN; machine learning; network optimization; prediction analysisMachine learningcomputer.software_genreChannel occupancyLoRalcsh:QA75.5-76.95network optimizationNetwork performanceProtocol (object-oriented programming)Profiling (computer programming)Artificial neural networkNetwork packetbusiness.industrySettore ING-INF/03 - TelecomunicazioniPipeline (software)LoRaWANHuman-Computer Interactionmachine learningprediction analysisArtificial intelligencelcsh:Electronic computers. Computer sciencebusinesscomputerCommunication channelcluster analysis
researchProduct

Architectures and protocols for mobile computing applications: a reconfigurable approach

2004

This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs. The control functions are implemented in a software module, named Reconfigurable Access module for MObile computiNg applications (RAMON), placed in mobile and/or base stations. RAMON operates on abstract models of the main communication functions of a wireless systems (e.g., transmission over the radio channel, coding end error recovery, capacity sharing and packet scheduling, handover, congestion control, etc.). RAMON algorithms are programmed with reference to the abstract models, independently of specific radi…

Computer Networks and Communicationsbusiness.industryComputer sciencemobile computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingReconfigurabilityreconfigurable systemsresource controllaw.inventionBluetoothNetwork congestionBase stationHandoverlawmobile computing; mobility management; reconfigurable systems; resource control; session controlCellular networkWirelessbusinessMobility managementmobility managementUMTS frequency bandssession controlComputer network
researchProduct

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

2020

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

FOS: Computer and information sciencesComputer scienceDistributed computingInternet of ThingsWireless communicationresource allocationServers02 engineering and technologyNetwork topologyspreading factorsinter-SF interferenceComputer Science - Networking and Internet Architecturechannel captureBandwidthServerLPWAN0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureElectrical and Electronic Engineeringinternet of t6hingsNetworking and Internet Architecture (cs.NI)Network packetbusiness.industryApplied MathematicsResource managementinternet of t6hings; LoRaWAN; spreading factors; resource allocation; adaptive data rate; channel capture; inter-SF interference020206 networking & telecommunicationsComputer Science ApplicationsLoRaWANadaptive data rateWide area networkScalabilityHeuristicsbusinessInterferenceUplinkCommunication channel
researchProduct