Search results for "Computer Networks"
showing 10 items of 860 documents
Sensor9k : A testbed for designing and experimenting with WSN-based ambient intelligence applications
2012
Ambient Intelligence systems are typically characterized by the use of pervasive equipment for monitoring and modifying the environment according to users' needs, and to globally defined constraints. Our work describes the implementation of a testbed providing the hardware and software tools for the development and management of AmI applications based on wireless sensor and actuator networks, whose main goal is energy saving for global sustainability. A sample application is presented that addresses temperature control in a work environment, through a multi-objective fuzzy controller taking into account users' preferences and energy consumption.
A multi‐agent system for itinerary suggestion in smart environments
2021
Abstract Modern smart environments pose several challenges, among which the design of intelligent algorithms aimed to assist the users. When a variety of points of interest are available, for instance, trajectory recommendations are needed to suggest users the most suitable itineraries based on their interests and contextual constraints. Unfortunately, in many cases, these interests must be explicitly requested and their lack causes the so‐called cold‐start problem. Moreover, lengthy travelling distances and excessive crowdedness of specific points of interest make itinerary planning more difficult. To address these aspects, a multi‐agent itinerary suggestion system that aims at assisting t…
METABOLIC NETWORKS ROBUSTNESS: THEORY, SIMULATIONS AND RESULTS
2011
Metabolic networks are composed of several functional modules, reproducing metabolic pathways and describing the entire cellular metabolism of an organism. In the last decade, an enormous interest has grown for the study of tolerance to errors and attacks in metabolic networks. Studies on their robustness have suggested that metabolic networks are tolerant to errors, but very vulnerable to targeted attacks against highly connected nodes. However, many findings on metabolic networks suggest that the above classification is too simple and imprecise, since hub node attacks can be by-passed if alternative metabolic paths can be exploited. On the contrary, non-hub nodes attacks can affect cell …
Copy–Move Forgery Detection by Matching Triangles of Keypoints
2015
Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…
SecureBallot: A secure open source e-Voting system
2021
Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…
Social-Behavioral Aware Optimization of Energy Consumption in Smart Homes
2018
Residential energy consumption is skyrocketing, as residential customers in the U.S. alone used 1.4 trillion kilowatt-hours in 2014 and the consumption is expected to increase in the next years. Previous efforts to limit such consumption have included demand response and smart residential environments. However, recent research has shown that such approaches can actually increase the overall energy consumption due to the numerous complex human psychological processes that take place when interacting with electrical appliances. In this paper we propose a social-behavioral aware framework for energy management in smart residential environments. We envision a smart home where appliances are int…
A hybrid system for malware detection on big data
2018
In recent years, the increasing diffusion of malicious software has encouraged the adoption of advanced machine learning algorithms to timely detect new threats. A cloud-based approach allows to exploit the big data produced by client agents to train such algorithms, but on the other hand, poses severe challenges on their scalability and performance. We propose a hybrid cloud-based malware detection system in which static and dynamic analyses are combined in order to find a good trade-off between response time and detection accuracy. Our system performs a continuous learning process of its models, based on deep networks, by exploiting the growing amount of data provided by clients. The prel…
A Framework for Parallel Assessment of Reputation Management Systems
2016
Several distributed applications running over the Internet use Reputation Management Systems (RMSs) to guarantee reliable interactions among unknown agents. Because of the heterogeneity of the existing RMSs, their assessment in terms of correctness and resistance to security attacks is not a trivial task. This work addresses this issue by presenting a novel parallel simulator aimed to support researchers in evaluating the performances of a RMS since the design phase. Preliminary results obtained by simulating two different attacks confirm the suitability of the proposed framework to evaluate different RMSs.
A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices
2019
The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…
Human Activity Recognition Process Using 3-D Posture Data
2015
In this paper, we present a method for recognizing human activities using information sensed by an RGB-D camera, namely the Microsoft Kinect. Our approach is based on the estimation of some relevant joints of the human body by means of the Kinect; three different machine learning techniques, i.e., K-means clustering, support vector machines, and hidden Markov models, are combined to detect the postures involved while performing an activity, to classify them, and to model each activity as a spatiotemporal evolution of known postures. Experiments were performed on Kinect Activity Recognition Dataset, a new dataset, and on CAD-60, a public dataset. Experimental results show that our solution o…