0000000000984547

AUTHOR

Marco Morana

showing 55 related works from this author

A Data Association Algorithm for People Re-Identification in Photo Sequences

2010

In this paper, a new system is presented to support the user in the face annotation task. Every time a photo sequence becomes available, the system analyses it to detect and cluster faces in set corresponding to the same person. We propose to model the problem of people re-identification in photos as a data association problem. In this way, the system takes advantage from the assumption that each person can appear at most once in each photo. We propose a fully automated method for grouping facial images, the method does not require any initialization neither a priori knowledge of the number of persons that are in the photo sequence. We compare the results obtained with our method and with s…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer sciencebusiness.industryFeature extractionInitializationPattern recognitionSensor fusionFacial recognition systemSet (abstract data type)Face (geometry)Photo Album Management Data Association Re- Identification Image databasesA priori and a posterioriArtificial intelligenceCluster analysisbusiness
researchProduct

A Framework for Parallel Assessment of Reputation Management Systems

2016

Several distributed applications running over the Internet use Reputation Management Systems (RMSs) to guarantee reliable interactions among unknown agents. Because of the heterogeneity of the existing RMSs, their assessment in terms of correctness and resistance to security attacks is not a trivial task. This work addresses this issue by presenting a novel parallel simulator aimed to support researchers in evaluating the performances of a RMS since the design phase. Preliminary results obtained by simulating two different attacks confirm the suitability of the proposed framework to evaluate different RMSs.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCorrectnessbusiness.industryComputer scienceDistributed computing02 engineering and technologyMulti-threaded applicationTask (project management)Human-Computer InteractionDesign phaseParallel simulationComputer Networks and CommunicationDistributed reputation management020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetParallel simulationbusinessSoftwareReputation managementProceedings of the 17th International Conference on Computer Systems and Technologies 2016
researchProduct

Face Processing on Low-Power Devices

2009

The research on embedded vision-based techniques is considered nowadays as one of the most interesting matters of computer vision. In this work we address the scenario in which a real-time face processing system is needed to monitor people walking through some locations. Some face detection (e.g., Viola-Jones face detector) and face recognition (e.g., eigenfaces) approaches have reached a certain level of maturity, so we focused on the development of such techniques on embedded systems taking into account both hardware and software constraints. Our goal is to detect the presence of some known individuals inside some sensitive areas producing a compact description of the observed people. Cap…

business.industryComputer scienceNode (networking)Real-time computingFacial recognition systemSoftwareEigenfaceEmbedded systemScalabilityResource allocation (computer)businessFace detectionWireless sensor networkface recognition embedded devices
researchProduct

An Ambient Intelligence System for Assisted Living

2017

Nowadays, the population's average age is constantly increasing, and thus the need for specialized home assistance is on the rise. Smart homes especially tailored to meet elderly and disabled people's needs can help them maintaining their autonomy, whilst ensuring their safety and well-being. This paper proposes a complete context-aware system for Ambient Assisted Living (AAL), which infers user's actions and context, analyzing its past and current behavior to detect anomalies and prevent possible emergencies. The proposed system exploits Dynamic Bayesian Networks to merge raw data coming from heterogeneous sensors and infer user's behavior and health conditions. A rule-based reasoner is ab…

QA75ExploitComputer sciencemedia_common.quotation_subjectPopulationAmbient Assisted Living02 engineering and technologyAmbient Assisted Living; Multi-sensor data fusion; Dynamic Bayesian Networks; Context awareness; Rule-based ReasoningDynamic Bayesian NetworkHome automationHuman–computer interaction0202 electrical engineering electronic engineering information engineeringeducationDynamic Bayesian networkmedia_commonSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studyAmbient intelligenceMulti-sensor data fusionbusiness.industryRule-based ReasoningContext awarene020206 networking & telecommunicationsSemantic reasoner020201 artificial intelligence & image processingbusinessRaw dataAutonomy
researchProduct

Real-time detection of twitter social events from the user's perspective

2015

Over the last 40 years, automatic solutions to analyze text documents collection have been one of the most attractive challenges in the field of information retrieval. More recently, the focus has moved towards dynamic, distributed environments, where documents are continuously created by the users of a virtual community, i.e., the social network. In the case of Twitter, such documents, called tweets, are usually related to events which involve many people in different parts of the world. In this work we present a system for real-time Twitter data analysis which allows to follow a generic event from the user's point of view. The topic detection algorithm we propose is an improved version of…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFocus (computing)Information retrievalSocial networkPoint (typography)Computer sciencebusiness.industryEvent (computing)Volume (computing)Field (computer science)Set (abstract data type)World Wide WebSocial Sensing Twitter Analysis Topic DetectionbusinessVirtual community2015 IEEE International Conference on Communications (ICC)
researchProduct

Human Mobility Simulator for Smart Applications

2019

Several issues related to Smart City development require the knowledge of accurate human mobility models, such as in the case of urban development planning or evacuation strategy definition. Nevertheless, the exploitation of real data about users' mobility results in severe threats to their privacy, since it allows to infer highly sensitive information. On the contrary, the adoption of simulation tools to handle mobility models allows to neglect privacy during the design of location-based services. In this work, we propose a simulation tool capable of generating synthetic datasets of human mobility traces; then, we exploit them to evaluate the effectiveness of algorithms which aim to detect…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMobility modelExploitPoint of interestComputer science020206 networking & telecommunications02 engineering and technologyPlan (drawing)Markov modelMarkov modelHuman Mobility SimulationSmart CitiesUrban planningSmart city0202 electrical engineering electronic engineering information engineeringSmart Campus020201 artificial intelligence & image processingSmart applicationsSimulation
researchProduct

A Platform for the Evaluation of Distributed Reputation Algorithms

2018

In distributed environments, where unknown entities cooperate to achieve complex goals, intelligent techniques for estimating agents' truthfulness are required. Distributed Reputation Management Systems (RMSs) allow to accomplish this task without the need for a central entity that may represent a bottleneck and a single point of failure. The design of a distributed RMS is a challenging task due to a multitude of factors that could impact on its performances. In order to support the researcher in evaluating the RMS robustness against security attacks since its beginning design phase, in this work we present a distributed simulation environment that allows to model both the agent's behaviors…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAgent-based simulationDistributed Reputation Management SystemComputer Networks and CommunicationMulti-agent systemArtificial IntelligenceModeling and SimulationComputer Science Application2018 IEEE/ACM 22nd International Symposium on Distributed Simulation and Real Time Applications (DS-RT)
researchProduct

SmartBuildings: An AmI system for energy efficiency

2015

Nowadays, the increasing global awareness of the importance of energy saving in everyday life acts as a stimulus to provide innovative ICT solutions for sustainability. In this scenario, the growing interest in smart homes has been driven both by socioeconomic and technological expectations. One of the key aspects of being smart is the efficiency of the urban apparatus, which includes, among others, energy, transportation and buildings. The present work describes SmartBuildings, a novel Ambient Intelligence system, which aims at reducing the energy consumption of "legacy" buildings by means of artificial intelligence techniques applied on heterogeneous sensor networks. A prototype has been …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArchitectural engineeringEngineeringAmbient intelligenceAmbient Intelligencebusiness.industryEnergy consumptionWork (electrical)Information and Communications TechnologySustainabilityKey (cryptography)businessWireless sensor networkSimulationEfficient energy use
researchProduct

Gesture Recognition for Improved User Experience in a Smart Environment

2013

Ambient Intelligence (AmI) is a new paradigm that specifically aims at exploiting sensory and context information in order to adapt the environment to the user's preferences; one of its key features is the attempt to consider common devices as an integral part of the system in order to support users in carrying out their everyday life activities without affecting their normal behavior. Our proposal consists in the definition of a gesture recognition module allowing users to interact as naturally as possible with the actuators available in a smart office, by controlling their operation mode and by querying them about their current state. To this end, readings obtained from a state-of-the-art…

Source dataAmbient intelligenceAmbient Intelligencebusiness.industryComputer scienceGesture RecognitionProbabilistic logicUsabilityMachine learningcomputer.software_genreSupport vector machineGesture recognitionArtificial intelligencebusinessClassifier (UML)computerGesture
researchProduct

Human Activity Recognition Process Using 3-D Posture Data

2015

In this paper, we present a method for recognizing human activities using information sensed by an RGB-D camera, namely the Microsoft Kinect. Our approach is based on the estimation of some relevant joints of the human body by means of the Kinect; three different machine learning techniques, i.e., K-means clustering, support vector machines, and hidden Markov models, are combined to detect the postures involved while performing an activity, to classify them, and to model each activity as a spatiotemporal evolution of known postures. Experiments were performed on Kinect Activity Recognition Dataset, a new dataset, and on CAD-60, a public dataset. Experimental results show that our solution o…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniImage fusionMarkov chainComputer Networks and CommunicationsComputer sciencebusiness.industryMaximum-entropy Markov modelFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHuman Factors and ErgonomicsPattern recognitionComputer Science ApplicationsHuman-Computer InteractionActivity recognitionSupport vector machineHuman activity recognition kinect ambient intelligenceArtificial IntelligenceControl and Systems EngineeringSignal ProcessingComputer visionArtificial intelligenceCluster analysisHidden Markov modelbusinessIEEE Transactions on Human-Machine Systems
researchProduct

A Simulation Framework for Evaluating Distributed Reputation Management Systems

2016

In distributed environments, where interactions involve unknown entities, intelligent techniques for estimating agents’ reputation are required. Reputation Management Systems (RMSs) aim to detect malicious behaviors that may affect the integrity of the virtual community. However, these systems are highly dependent of the application domain they address; hence the evaluation of different RMSs in terms of correctness and resistance to security attacks is frequently a tricky task. In this work we present a simulation framework to support researchers in the assessment of a RMS. The simulator is organized in two logic layers where network nodes are mapped to system processes that implement the i…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCorrectnessComputer scienceDistributed computingmedia_common.quotation_subjectComputer Science (all)Message Passing InterfaceSimulation framework020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreTask (project management)Distributed reputation managementControl and Systems EngineeringApplication domain020204 information systemsSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringMultiagent systemcomputerReputation managementVirtual communityReputationmedia_common
researchProduct

Smartphone data analysis for human activity recognition

2017

In recent years, the percentage of the population owning a smartphone has increased significantly. These devices provide the user with more and more functions, so that anyone is encouraged to carry one during the day, implicitly producing that can be analysed to infer knowledge of the user’s context. In this work we present a novel framework for Human Activity Recognition (HAR) using smartphone data captured by means of embedded triaxial accelerometer and gyroscope sensors. Some statistics over the captured sensor data are computed to model each activity, then real-time classification is performed by means of an efficient supervised learning technique. The system we propose also adopts a …

education.field_of_studyParticipatory sensingComputer sciencebusiness.industryTriaxial accelerometerSupervised learningPopulationComputer Science (all)020206 networking & telecommunicationsContext (language use)Gyroscope02 engineering and technologyMachine learningcomputer.software_genrelaw.inventionTheoretical Computer ScienceActivity recognitionlaw0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligenceeducationbusinesscomputer
researchProduct

Probabilistic Corner Detection for Facial Feature Extraction

2009

After more than 35 years of resarch, face processing is considered nowadays as one of the most important application of image analysis. It can be considered as a collection of problems (i.e., face detection, normalization, recognition and so on) each of which can be treated separately. Some face detection and face recognition techniques have reached a certain level of maturity, however facial feature extraction still represents the bottleneck of the entire process. In this paper we present a novel facial feature extraction approach that could be used for normalizing Viola-Jones detected faces and let them be recognized by an appearance-based face recognition method. For each observed featur…

Face hallucinationbusiness.industryComputer scienceFeature extractionCorner detectionNormalization (image processing)Pattern recognitionFace detection - face recognition - features extraction - CBIRFacial recognition systemObject-class detectionThree-dimensional face recognitionComputer visionArtificial intelligenceFace detectionbusiness
researchProduct

A data association approach to detect and organize people in personal photo collections

2011

In this paper we present a method to automatically segment a photo sequence in groups containing the same persons. Many methods in literature accom- plish to this task by adopting clustering techniques. We model the problem as the search for probable associations between faces detected in subsequent photos con- sidering the mutual exclusivity constraint: a person can not be in a photo two times, nor two faces in the same photo can be assigned to the same group. Associations have been found considering face and clothing descriptions. In particular, a two level architecture has been adopted: at the first level, associations are computed within meaningful temporal windows (situations); at the …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSequenceDigital library Personal photo album Data association Re-identificationInformation retrievalComputer Networks and CommunicationsComputer scienceDigital librarycomputer.software_genreTask (project management)Constraint (information theory)Hardware and ArchitectureData associationFace (geometry)Media TechnologyData miningCluster analysiscomputerSoftware
researchProduct

Enabling Technologies on Hybrid Camera Networks for Behavioral Analysis of Unattended Indoor Environments and Their Surroundings

2008

This paper presents a layered network architecture and the enabling technologies for accomplishing vision-based behavioral analysis of unattended environments. Specifically the vision network covers both the attended environment and its surroundings by means of multi-modal cameras. The layer overlooking at the surroundings is laid outdoor and tracks people, monitoring entrance/exit points. It recovers the geometry of the site under surveillance and communicates people positions to a higher level layer. The layer monitoring the unattended environment undertakes similar goals, with the addition of maintaining a global mosaic of the observed scene for further understanding. Moreover, it merges …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetwork architecturebusiness.industryReliability (computer networking)Computer laboratorydistributed video surveillanceSMART CAMERA NETWORKSBehavioral analysisMULTI-MODAL SENSOR FUSIONECamera networkGeographyHuman–computer interactionmulti-modal surveillance; wireless sensor networksEMBEDDED SMART CAMERASmulti-modal surveillanceMULTI-MODAL SENSOR FUSIONE; SMART CAMERA NETWORKS; EMBEDDED SMART CAMERASComputer visionArtificial intelligenceLayer (object-oriented design)businesswireless sensor networks
researchProduct

Clustering techniques for personal photo album management

2009

In this work we propose a novel approach for the automatic representation of pictures achieving at more effective organization of personal photo albums. Images are analyzed and described in multiple representation spaces, namely, faces, background and time of capture. Faces are automatically detected, rectified and represented projecting the face itself in a common low-dimensional eigenspace. Backgrounds are represented with low-level visual features based on RGB histogram and Gabor filter bank. Faces, time and background information of each image in the collection is automatically organized using a mean-shift clustering technique. Given the particular domain of personal photo libraries, wh…

Gabor filterspattern clusteringComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONcontent-based retrievalFacial recognition systemimage retrievalimage colour analysisHistogramComputer visionimage representationElectrical and Electronic EngineeringCluster analysisImage retrievalMathematicsbusiness.industryCBIR - Content Based Image Retrieval automatic image annotation personal photo album managementPattern recognitionAtomic and Molecular Physics and OpticsComputer Science ApplicationsData setAutomatic image annotationFace (geometry)RGB color modelArtificial intelligenceeigenvalues and eigenfunctionsbusinessface recognitionJournal of Electronic Imaging
researchProduct

A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices

2019

The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitComputer Networks and CommunicationsComputer sciencebusiness.industryBandwidth (signal processing)Activity tracker020206 networking & telecommunicationsCloud computing02 engineering and technologyActivity recognitionHuman–computer interactionHuman activity recognition mobile crowdsensing fog computing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentbusinessMobile deviceWearable technologyACM Transactions on Internet Technology
researchProduct

Smart Auctions for Autonomic Ambient Intelligence Systems

2020

The main goal of Ambient Intelligence (AmI) is to support users in their daily activities by satisfying and anticipating their needs. To achieve such goal, AmI systems rely on physical infrastructures made of heterogenous sensing devices which interact in order to exchange information and perform monitoring tasks. In such a scenario, a full achievement of AmI vision would also require the capability of the system to autonomously check the status of the infrastructure and supervise its maintenance. To this aim, in this paper, we extend some previous works in order to allow the self-management of AmI devices enabling them to directly interact with maintenance service providers. In particular,…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceAmbient IntelligenceComputer sciencebusiness.industryMulti-agent systemSmart Contracts.020206 networking & telecommunications02 engineering and technologyTrusted ComputingService providerTrusted third partyComputer securitycomputer.software_genreMaintenance engineeringHome automation0202 electrical engineering electronic engineering information engineeringCommon value auction020201 artificial intelligence & image processingbusinesscomputer2020 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

A multi‐agent system for itinerary suggestion in smart environments

2021

Abstract Modern smart environments pose several challenges, among which the design of intelligent algorithms aimed to assist the users. When a variety of points of interest are available, for instance, trajectory recommendations are needed to suggest users the most suitable itineraries based on their interests and contextual constraints. Unfortunately, in many cases, these interests must be explicitly requested and their lack causes the so‐called cold‐start problem. Moreover, lengthy travelling distances and excessive crowdedness of specific points of interest make itinerary planning more difficult. To address these aspects, a multi‐agent itinerary suggestion system that aims at assisting t…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArtificial intelligenceComputer Networks and CommunicationsComputer scienceMulti-agent systemDistributed computingpattern recognitionHuman-Computer InteractionQA76.75-76.765Computational linguistics. Natural language processingSmart environmentComputer softwareComputer Vision and Pattern RecognitionP98-98.5Information Systems
researchProduct

Automatic Generation of Subject-Based Image Transitions

2011

This paper presents a novel approach for the automatic generation of image slideshows. Counter to standard cross-fading, the idea is to operate the image transitions keeping the subject focused in the intermediate frames by automatically identifying him/her and preserving face and facial features alignment. This is done by using a novel Active Shape Model and time-series Image Registration. The final result is an aesthetically appealing slideshow which emphasizes the subject. The results have been evaluated with a users’ response survey. The outcomes show that the proposed slideshow concept is widely preferred by final users w.r.t. standard image transitions.

Face processing; image morphing; image registrationComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage registrationSubject (documents)Image processingimage morphingImage (mathematics)image registrationAutomatic image annotationActive shape modelFace (geometry)Face processingComputer visionArtificial intelligencebusinessFeature detection (computer vision)
researchProduct

Bio-inspired Sensory Data Aggregation

2013

The Ambient Intelligence (AmI) research field focuses on the design of systems capable of adapting the surrounding environmental conditions so that they can match the users needs, whether those are consciously expressed or not [4][1].

Data aggregatorSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringAmbient intelligenceAmbient Intelligencebusiness.industryComputerApplications_GENERALSensory systemArtificial intelligenceCognitive capabilitybusinessWireless sensor networkField (computer science)
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct

Uno Smart Campus per UniPA

2017

L’accesso pervasivo alla rete ha avviato una profonda trasformazione del tessuto sociale e culturale, incidendo profondamente anche sui processi di erogazione dei servizi della Pubblica Amministrazione. L’Università degli Studi di Palermo si inserisce in tale contesto, avendo recentemente intrapreso un percorso di innovazione che mira ad espandere i confini della didattica, della divulgazione del sapere scientifico, della creazione di nuova scienza e cultura, al fine di creare uno Smart Campus pronto ad accogliere gli studenti ormai “nativi digitali”.

Servizi per la didatticaSmart campus cloud
researchProduct

Smart Assistance for Students and People Living in a Campus

2019

Being part of one of the fastest growing area in Artificial Intelligence (AI), virtual assistants are nowadays part of everyone's life being integrated in almost every smart device. Alexa, Siri, Google Assistant, and Cortana are just few examples of the most famous ones. Beyond these off-the-shelf solutions, different technologies which allow to create custom assistants are available. IBM Watson, for instance, is one of the most widely-adopted question-answering framework both because of its simplicity and accessibility through public APIs. In this work, we present a virtual assistant that exploits the Watson technology to support students and staff of a smart campus at the University of Pa…

Smart service systemMultimediaExploitWatsonComputer sciencemedia_common.quotation_subjectSmart device02 engineering and technologycomputer.software_genreRemote assistanceVirtual Assistantlaw.inventionWork (electrical)lawSmart Campu020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSimplicitySmart campuscomputerIbm watsonmedia_common2019 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

3D Scene Reconstruction Using Kinect

2014

The issue of the automatic reconstruction of 3D scenes has been addressed in several chapters over the last few years. Many of them describe techniques for processing stereo vision or range images captured by high quality range sensors. However, due to the high price of such input devices, most of the methods proposed in the literature are not suitable for real-world scenarios. This chapter proposes a method designed to reconstruct 3D scenes perceived by means of a cheap device, namely the Kinect sensor. The scene is efficiently represented as a composition of superquadric shapes so as to obtain a compact description of environment, however complex it may be. The approach proposed here is i…

Computer sciencebusiness.industrymedia_common.quotation_subjectComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONInput deviceCognitive architectureScene Reconstruction 3D Data KinectReal imageRange (mathematics)StereopsisComputer visionQuality (business)Artificial intelligencebusinessmedia_common
researchProduct

User detection through multi-sensor fusion in an AmI scenario

2012

Recent advances in technology, with regard to sensing and transmission devices, have made it possible to obtain continuous and precise monitoring of a wide range of qualitatively diverse environments. This has boosted the research on the novel field of Ambient Intelligence, which aims at exploiting the information about the environment state in order to adapt it to the user’s preference. In this paper, we analyze the issue of detecting the user’s presence in a given region of the monitored area, which is crucial in order to trigger subsequent actions. In particular, we present a comprehensive framework that turns data perceived by sensors of different nature, and with possible imprecision, …

Multi-sensor fusionAmbient intelligenceUser profiling
researchProduct

SpADe: Multi-Stage Spam Account Detection for Online Social Networks

2022

In recent years, Online Social Networks (OSNs) have radically changed the way people communicate. The most widely used platforms, such as Facebook, Youtube, and Instagram, claim more than one billion monthly active users each. Beyond these, news-oriented micro-blogging services, e.g., Twitter, are daily accessed by more than 120 million users sharing contents from all over the world. Unfortunately, legitimate users of the OSNs are mixed with malicious ones, which are interested in spreading unwanted, misleading, harmful, or discriminatory content. Spam detection in OSNs is generally approached by considering the characteristics of the account under analysis, its connection with the rest of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSocial Network Security Spam Detection Artificial IntelligenceElectrical and Electronic EngineeringIEEE Transactions on Dependable and Secure Computing
researchProduct

A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

2019

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceDistributed algorithmComputer scienceMulti-agent systemQuality of servicemedia_common.quotation_subjectNetwork simulation020206 networking & telecommunications02 engineering and technologycomputer.software_genreVariety (cybernetics)Simulation softwareDistributed systems security.Risk analysis (engineering)Software deploymentRobustness (computer science)020204 information systems0202 electrical engineering electronic engineering information engineeringDisseminationcomputerReputationmedia_common
researchProduct

Your friends mention It. What about visiting it? A mobile social-based sightseeing application

2016

In this short poster paper, we present an application for suggesting attractions to be visited by users, based on social signal processing techniques.

World Wide WebHuman-Computer InteractionSoftwareComputer scienceHuman–computer interactionbusiness.industry0202 electrical engineering electronic engineering information engineering020206 networking & telecommunicationsSoftware; Human-Computer Interaction02 engineering and technologybusinessTourismSoftware
researchProduct

A fog-based hybrid intelligent system for energy saving in smart buildings

2019

In recent years, the widespread diffusion of pervasive sensing devices and the increasing need for reducing energy consumption have encouraged research in the energy-aware management of smart environments. Following this direction, this paper proposes a hybrid intelligent system which exploits a fog-based architecture to achieve energy efficiency in smart buildings. Our proposal combines reactive intelligence, for quick adaptation to the ever-changing environment, and deliberative intelligence, for performing complex learning and optimization. Such hybrid nature allows our system to be adaptive, by reacting in real time to relevant events occurring in the environment and, at the same time, …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniQA75General Computer ScienceAmbient Intelligence Fuzzy Systems Fog Computing Energy Efficiencybusiness.industryComputer scienceDistributed computingComputational intelligence02 engineering and technologyEnergy consumptionHybrid intelligent systemHome automation020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentbusinessAdaptation (computer science)Efficient energy useBuilding automationJournal of Ambient Intelligence and Humanized Computing
researchProduct

Assisted labeling for spam account detection on twitter

2019

Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…

Social network021110 strategic defence & security studiesInformation retrievalSocial networkbusiness.industryComputer scienceSpam detectionSmart device0211 other engineering and technologies020206 networking & telecommunicationsUsability02 engineering and technologycomputer.software_genrePhishinglaw.inventionManual annotationlawComputer security0202 electrical engineering electronic engineering information engineeringBlacklistingMalwarebusinessCluster analysiscomputer
researchProduct

A Heterogeneous Sensor and Actuator Network Architecture for Ambient Intelligence

2014

One of the most important characteristics of a typical ambient intelligence scenario is the presence of a number of sensors and actuators that capture information about user preferences and activities. Such nodes, i.e., sensors and actuators, are often based on different technologies so that types of networks which are typically different coexist in a real system, for example, in a home or a building. In this chapter we present a heterogeneous sensor and actuator network architecture designed to separate network management issues from higher, intelligent layers. The effectiveness of the solution proposed here was evaluated using an experimental scenario involving the monitoring of an office…

Network architectureAmbient intelligenceGeographic information systemAmbient IntelligenceComputer sciencebusiness.industryReal-time computingNetwork managementSensor nodeEmbedded systemWireless Sensor NetworksActuatorbusinessWireless sensor network
researchProduct

An Intelligent System for Energy Efficiency in a Complex of Buildings

2012

Energy efficiency has nowadays become one of the most challenging task for both academic and commercial organizations, and this has boosted research on novel fields, such as Ambient Intelligence. In this paper we address the issue of timely and ubiquitous monitoring of building complexes in order to optimize their energy consumption, and present an intelligent system addressed to the typical end user, i.e. the administrator, or responsible operator, of the complex. A three-level architecture has been designed for detecting the presence of the building inhabitants user and understanding their preferences with respect to the environmental conditions in order to optimize the overall energy eff…

Ambient Intelligence Energy Efficiency Wireless sensor and actuator networks
researchProduct

A Context-Aware System for Ambient Assisted Living

2017

In the near future, the world's population will be characterized by an increasing average age, and consequently, the number of people requiring for a special household assistance will dramatically rise. In this scenario, smart homes will significantly help users to increase their quality of life, while maintaining a great level of autonomy. This paper presents a system for Ambient Assisted Living (AAL) capable of understanding context and user's behavior by exploiting data gathered by a pervasive sensor network. The knowledge inferred by adopting a Bayesian knowledge extraction approach is exploited to disambiguate the collected observations, making the AAL system able to detect and predict…

QA75Computer sciencemedia_common.quotation_subjectPopulationAmbient Assisted LivingContext (language use)02 engineering and technologyTheoretical Computer ScienceDynamic Bayesian NetworkKnowledge extractionQuality of lifeRule-based reasoningHuman–computer interactionHome automation0202 electrical engineering electronic engineering information engineeringContext awarenesseducationmedia_commonSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studyMulti-sensor data fusionbusiness.industryComputer Science (all)Context awarene020206 networking & telecommunicationsRule-based system020201 artificial intelligence & image processingbusinessWireless sensor networkAutonomy
researchProduct

A framework for real-time Twitter data analysis

2016

A framework for real-time Twitter data analysisWe propose improvements to the Soft Frequent Pattern Mining (SFPM) algorithmThe stream of tweets is organized in dynamic windows whose size depends both on the volume of tweets and timeThe set of keywords used to query Twitter is progressively refined to highlight the user's point of viewComparisons with two state of the art systems Twitter is a popular social network which allows millions of users to share their opinions on what happens all over the world. In this work we present a system for real-time Twitter data analysis in order to follow popular events from the user's perspective. The method we propose extends and improves the Soft Freque…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniPoint (typography)Social networkComputer Networks and Communicationsbusiness.industryComputer sciencePerspective (graphical)Volume (computing)02 engineering and technologycomputer.software_genreSocial sensingSet (abstract data type)Order (business)020204 information systems0202 electrical engineering electronic engineering information engineeringTwitter analysi020201 artificial intelligence & image processingState (computer science)Data miningTopic detectionbusinesscomputerComputer Communications
researchProduct

A Federated Learning Approach for Distributed Human Activity Recognition

2022

In recent years, the widespread diffusion of smart pervasive devices able to provide AI-based services has encouraged research in the definition of new distributed learning paradigms. Federated Learning (FL) is one of the most recent approaches which allows devices to collaborate to train AI-based models, whereas guarantying privacy and lower communication costs. Although different studies on FL have been conducted, a general and modular architecture capable of performing well in different scenarios is still missing. Following this direction, this paper proposes a general FL framework whose validity is assessed by considering a distributed activity recognition scenario in which users' perso…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFederated Learning Distributed Computing Machine Learning Human Activity Recognition
researchProduct

User Activity Recognition via Kinect in an Ambient Intelligence Scenario

2014

The availability of an ever-increasing kind of cheap, unobtrusive, sensing devices has stressed the need for new approaches to merge raw measurements in order to realize what is happening in the monitored environment. Ambient Intelligence (AmI) techniques exploit information about the environment state to adapt the environment itself to the users’ preferences. Even if traditional sensors allow a rough understanding of the users’ preferences, ad-hoc sensors are required to obtain a deeper comprehension of users’ habits and activities. In this paper we propose a framework to recognize users’ activities via a depth and RGB camera device, namely the Microsoft Kinect. The proposed approach takes…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringKinectAmbient intelligenceAmbient IntelligenceExploitbusiness.industryUser ProfilingActivity Recognitioncomputer.software_genreActivity recognitionSupport vector machineHuman–computer interactionData miningCluster analysisbusinessMerge (version control)computerIERI Procedia
researchProduct

A hybrid system for malware detection on big data

2018

In recent years, the increasing diffusion of malicious software has encouraged the adoption of advanced machine learning algorithms to timely detect new threats. A cloud-based approach allows to exploit the big data produced by client agents to train such algorithms, but on the other hand, poses severe challenges on their scalability and performance. We propose a hybrid cloud-based malware detection system in which static and dynamic analyses are combined in order to find a good trade-off between response time and detection accuracy. Our system performs a continuous learning process of its models, based on deep networks, by exploiting the growing amount of data provided by clients. The prel…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniControl and OptimizationExploitComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingBig dataFeature extraction020206 networking & telecommunicationsCloud computing02 engineering and technologyStatic analysiscomputer.software_genreArtificial IntelligenceHybrid systemScalability0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingbusinesscomputerIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

Three-domain image representation for personal photo album management

2010

In this paper we present a novel approach for personal photo album management. Pictures are analyzed and described in three representation spaces, namely, faces, background and time of capture. Faces are automatically detected and rectified using a probabilistic feature extraction technique. Face representation is then produced by computing PCA (Principal Component Analysis). Backgrounds are represented with low-level visual features based on RGB histogram and Gabor filter bank. Temporal data is obtained through the extraction of EXIF (Exchangeable image file format) data. Each image in the collection is then automatically organized using a mean-shift clustering technique. While many system…

Computer sciencebusiness.industryFeature extractionCBIR - Content Based Image Retrieval automatic image annotation personal photo album managementComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingcomputer.file_formatGabor filterAutomatic image annotationHistogramFace (geometry)RGB color modelComputer visionArtificial intelligenceImage file formatsImage sensorCluster analysisbusinesscomputer
researchProduct

Motion sensors for activity recognition in an ambient-intelligence scenario

2013

In recent years, Ambient Intelligence (AmI) has attracted a number of researchers due to the widespread diffusion of unobtrusive sensing devices. The availability of such a great amount of acquired data has driven the interest of the scientific community in producing novel methods for combining raw measurements in order to understand what is happening in the monitored scenario. Moreover, due the primary role of the end user, an additional requirement of any AmI system is to maintain a high level of pervasiveness. In this paper we propose a method for recognizing human activities by means of a time of flight (ToF) depth and RGB camera device, namely Microsoft Kinect. The proposed approach is…

Ambient intelligencebusiness.industryComputer scienceSupport vector machineActivity recognitionActivity Recognition Ambient IntelligencePattern recognition (psychology)RGB color modelComputer visionArtificial intelligenceHidden Markov modelbusinessCluster analysisWireless sensor network2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
researchProduct

Adversarial Machine Learning in e-Health: Attacking a Smart Prescription System

2022

Machine learning (ML) algorithms are the basis of many services we rely on in our everyday life. For this reason, a new research line has recently emerged with the aim of investigating how ML can be misled by adversarial examples. In this paper we address an e-health scenario in which an automatic system for prescriptions can be deceived by inputs forged to subvert the model's prediction. In particular, we present an algorithm capable of generating a precise sequence of moves that the adversary has to take in order to elude the automatic prescription service. Experimental analyses performed on a real dataset of patients' clinical records show that a minimal alteration of the clinical record…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAdversarial Machine Learning Healthcare Evasion attacks
researchProduct

Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance

2023

Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of security attacks. One of the most effective analysis techniques is differential cryptanalysis, whose aim is to study how variations in the input propagate on the output. In this work we address the modeling of differential attacks to block cipher algorithms by defining a Bayesian framework that allows a probabilistic estimation of the secret key. In order to prove the validity of the proposed approach, we present as case study a differential att…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceGeneral EngineeringGeneral Materials ScienceElectrical and Electronic EngineeringDifferential Cryptanalysis Bayesian Networks Probabilistic Inference DESIEEE Access
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

DRESS: A Distributed RMS Evaluation Simulation Software

2020

Distributed environments consist of a huge number of entities that cooperate to achieve complex goals. When interactions occur between unknown parties, intelligent techniques for estimating agent reputations are required. Reputation management systems (RMS's) allow agents to perform such estimation in a cooperative way. In particular, distributed RMS's exploit feedbacks provided after each interaction and allow prediction of future behaviors of agents. Such systems, in contrast to centralized RMSs, are sensitive to fake information injected by malicious users; thus, predicting the performance of a distributed RMS is a very challenging task. Although many existing works have addressed some c…

Computer architectureComputer scienceAgent-based Simulation Multi-agent Systems Distributed RMSs020204 information systemsMulti-agent system0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDecision Sciences (miscellaneous)02 engineering and technologycomputer.software_genrecomputerInformation SystemsSimulation softwareInternational Journal of Intelligent Information Technologies
researchProduct

Gait Analysis Using Multiple Kinect Sensors

2014

A gait analysis technique to model user presences in an office scenario is presented in this chapter. In contrast with other approaches, we use unobtrusive sensors, i.e., an array of Kinect devices, to detect some features of interest. In particular, the position and the spatio-temporal evolution of some skeletal joints are used to define a set of gait features, which can be either static (e.g., person height) or dynamic (e.g., gait cycle duration). Data captured by multiple Kinects is merged to detect dynamic features in a longer walk sequence. The approach proposed here was been evaluated by using three classifiers (SVM, KNN, Naive Bayes) on different feature subsets.

Kinectbusiness.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONContrast (statistics)User ProfilingGaitSet (abstract data type)ComputingMethodologies_PATTERNRECOGNITIONGait (human)Position (vector)Feature (computer vision)Gait analysisAmbient IntellicenceComputer visionArtificial intelligencebusiness
researchProduct

A Combined Fuzzy and Probabilistic Data Descriptor for Distributed CBIR

2009

With the wide diffusion of digital image acquisition devices, the cost of managing hundreds of digital images is quickly increasing. Currently, the main way to search digital image libraries is by keywords given by the user. However, users usually add ambiguos keywords for large set of images. A content-based system intended to automatically find a query image, or similar images, within the whole collection is needed. In our work we address the scenario where medical image collections, which nowadays are rapidly expanding in quantity and heterogeneity, are shared in a distributed system to support diagnostic and preventive medicine. Our goal is to produce an efficient content-based descript…

Fuzzy clustering distributed CBIR medical imagesFuzzy clusteringInformation retrievalComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONProbabilistic logicDigital imagingcomputer.software_genreDigital imageAutomatic image annotationDigital image processingData miningImage analysisImage retrievalcomputer
researchProduct

Mimicking biological mechanisms for sensory information fusion

2013

Current Artificial Intelligence systems are bound to become increasingly interconnected to their surrounding environment in the view of the newly rising Ambient Intelligence (AmI) perspective. In this paper, we present a comprehensive AmI framework for performing fusion of raw data, perceived by sensors of different nature, in order to extract higher-level information according to a model structured so as to resemble the perceptual signal processing occurring in the human nervous system. Following the guidelines of the greater BICA challenge, we selected the specific task of user presence detection in a locality of the system as a representative application clarifying the potentialities of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceKnowledge representation and reasoningAmbient IntelligenceComputer sciencebusiness.industryCognitive Neurosciencemedia_common.quotation_subjectLocalityExperimental and Cognitive PsychologyCognitive architectureMachine learningcomputer.software_genreCognitive architectureArtificial IntelligencePerceptionArtificial intelligenceInference engineInformation fusionHidden Markov modelbusinessRaw datacomputermedia_common
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

Malware detection through low-level features and stacked denoising autoencoders

2018

In recent years, the diffusion of malicious software through various channels has gained the request for intelligent techniques capable of timely detecting new malware spread. In this work, we focus on the application of Deep Learning methods for malware detection, by evaluating their effectiveness when malware are represented by high-level, and lowlevel features respectively. Experimental results show that, when using high-level features, deep neural networks do not significantly improve the overall detection accuracy. On the other hand, when low-level features, i.e., small pieces of information extracted through a light processing, are chosen, they allow to increase the capability of corr…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Science (all)
researchProduct

A Java-based Wrapper for Wireless Communications

2008

The increasing number of new applications for mobile devices in pervasive environments, do not cope with changes in the wireless communications. Developers of such applications have to deal with problems arising from the available wireless connections in the given environment. A middleware is a solution that allows to overcome some of these problems. It provides to the applications a set of functions that facilitate their development. In this paper we present a Java-based communication wrapper, called SmartTraffic, which allows programmers to seamlessly use TCP or UDP protocols over Bluetooth or any IP-based wireless network. Developers can use SmartTraffic within their Java applications, t…

Wi-Fi arrayJavaWireless networkbusiness.industryComputer sciencepervasive systemsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computinglaw.inventionBluetoothWireless site surveylawMiddlewareWirelessbusinesscomputercomputer.programming_languageComputer network2008 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

Twitter Analysis for Real-Time Malware Discovery

2017

In recent years, the increasing number of cyber-attacks has gained the development of innovative tools to quickly detect new threats. A recent approach to this problem is to analyze the content of Social Networks to discover the rising of new malicious software. Twitter is a popular social network which allows millions of users to share their opinions on what happens all over the world. The subscribers can insert messages, called tweet, that are usually related to international news. In this work, we present a system for real-time malware alerting using a set of tweets captured through the Twitter API’s, and analyzed by means of a Bayes naïve classifier. Then, groups of tweets discussing th…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni021110 strategic defence & security studiesSocial networkSocial SensingComputer sciencebusiness.industry0211 other engineering and technologies02 engineering and technologycomputer.software_genreMalware AlertsSocial Sensing; Twitter Analysis; Malware AlertsWorld Wide WebBayes' theoremTwitter Analysi0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingbusinesscomputerClassifier (UML)
researchProduct

Mobile Interface for Content-Based Image Management

2010

People make more and more use of digital image acquisition devices to capture screenshots of their everyday life. The growing number of personal pictures raise the problem of their classification. Some of the authors proposed an automatic technique for personal photo album management dealing with multiple aspects (i. e., people, time and background) in a homogenous way. In this paper we discuss a solution that allows mobile users to remotely access such technique by means of their mobile phones, almost from everywhere, in a pervasive fashion. This allows users to classify pictures they store on their devices. The whole solution is presented, with particular regard to the user interface impl…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCBIR - Content Based Image RetrievalMultimediaComputer sciencebusiness.industryMobile computingDigital imagingcomputer.software_genremobile interfacemobile interfaces; pervasive systems; CBIR - Content Based Image RetrievalMobile phoneServerMobile searchpervasive systemUser interfacebusinessImage retrievalcomputerContent management2010 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

KARD - Kinect Activity Recognition Dataset

2017

To cite this dataset, please refer to the following paper:Human Activity Recognition Process Using 3-D Posture Data. S. Gaglio, G. Lo Re, M. Morana. In IEEE Transactions on Human-Machine Systems. 2014 doi: 10.1109/THMS.2014.2377111******************************************************************KARD contains 18 Activities. Each activity is performed 3 times by 10 different subjects.1Horizontal arm wave2High arm wave3Two hand wave4Catch Cap5High throw6Draw X7Draw Tick8Toss Paper9Forward Kick10Side Kick11Take Umbrella12Bend13Hand Clap14Walk15Phone Call16Drink17Sit down18Stand upIn total, you have 4 (files) x 18 (activities) x 3 (repetitions) x 10 (subjects), that is 2160 files.Each filename …

Ambient IntelligenceArtificial IntelligenceComputer ScienceInterdisciplinary sciencesOtherActivity Recognition3D Imaging
researchProduct

IMAGE AND FACE ANALYSIS FOR PERSONAL PHOTO ORGANIZATION

2011

In recent years, digital cameras are becoming very commonplace and users need tools to manage large personal photo collections. In a typical scenario, a user acquires a certain number of pictures and then transfers this new photo sequence to his PC. Thus, before being added to the whole personal photo collection, it would be desirable that this new photo sequence is processed and organized. For example, users may be interested in using (i.e., browsing, saving, printing and so on) a subset of stored data according to some particular picture properties. For these reasons, automatic techniques for content-based description of personal photos are needed. Tools enabling an incremental organizati…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFACE ANALYSISIMAGEPHOTO
researchProduct

Automatic image representation and clustering on mobile devices.

2010

In this paper a novel approach for the automatic representation of pictures on mobile devices is proposed. With the wide diffusion of mobile digital image acquisition devices, the need of managing a large number of digital images is quickly increasing. In fact the storage capacity of such devices allow users to store hundreds or even thousands, of pictures that, without a proper organization, become useless. Users may be interested in using (i.e., browsing, saving, printing and so on) a subset of stored data according to some particular picture properties. A content-based description of each picture is needed to perform on-board image indexing. In our work the images are analyzed and descri…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCBIR automatic image annotation mobile devicesImage retrievalmean-shift clusteringpersonal photo albumPhoto collection
researchProduct