0000000000077530

AUTHOR

Francesca Cuomo

0000-0002-1166-6970

Evolution of Free Amino Acids, Histamine and Volatile Compounds in the Italian Anchovies (Engraulis encrasicolus L.) Sauce at Different Ripening Times

In this study, the evolution of the safety, nutritional, and volatile profile of a traditional Italian anchovy sauce with protected designation of origin (PDO), called “colatura di alici di Cetara”, is investigated after 12, 24, and 48 months of aging in wooden barrels. Some physicochemical parameters, free amino acids, volatile compounds, and histamine contents were evaluated during the aging of the samples. Glutamate, which together with aspartate is responsible for the umami taste, was the predominant free amino acid in the tested fish sauce, with a significant increase during the 48 months of maturation. The total amino acid content of the anchovy sauce increased from 24 to …

research product

Exploratory approach for network behavior clustering in LoRaWAN

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as I…

research product

Discovery privacy threats via device de-anonymization in LoRaWAN

LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…

research product

A Clustering approach for profiling LoRaWAN IoT devices

Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…

research product

Leakage Detection via Edge Processing in LoRaWAN-based Smart Water Distribution Networks

The optimization and digitalization of Water Distribution Networks (WDNs) are becoming key objectives in our modern society. Indeed, WDNs are typically old, worn and obsolete. These inadequate conditions of the infrastructures lead to significant water loss due to leakages inside pipes, junctions and nodes. It has been measured that in Europe the average value of lost water is about 26 %. Leakage control in current WDNs is typically passive, repairing leaks only when they are visible. Emerging Low Power Wide Area Network (LPWAN) technologies, and especially IoT ones, can help monitor water consumption and automatically detect leakages. In this context, LoRaWAN can be the right way to deploy…

research product

Predicting lorawan behavior. How machine learning can help

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance (and if and how they can help). To this aim, we describe a methodology to process LoRaWAN packets a…

research product

Architectures and protocols for mobile computing applications: a reconfigurable approach

This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs. The control functions are implemented in a software module, named Reconfigurable Access module for MObile computiNg applications (RAMON), placed in mobile and/or base stations. RAMON operates on abstract models of the main communication functions of a wireless systems (e.g., transmission over the radio channel, coding end error recovery, capacity sharing and packet scheduling, handover, congestion control, etc.). RAMON algorithms are programmed with reference to the abstract models, independently of specific radi…

research product

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

research product