Search results for "Control and Optimization"

showing 10 items of 448 documents

A hybrid system for malware detection on big data

2018

In recent years, the increasing diffusion of malicious software has encouraged the adoption of advanced machine learning algorithms to timely detect new threats. A cloud-based approach allows to exploit the big data produced by client agents to train such algorithms, but on the other hand, poses severe challenges on their scalability and performance. We propose a hybrid cloud-based malware detection system in which static and dynamic analyses are combined in order to find a good trade-off between response time and detection accuracy. Our system performs a continuous learning process of its models, based on deep networks, by exploiting the growing amount of data provided by clients. The prel…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniControl and OptimizationExploitComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingBig dataFeature extraction020206 networking & telecommunicationsCloud computing02 engineering and technologyStatic analysiscomputer.software_genreArtificial IntelligenceHybrid systemScalability0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingbusinesscomputerIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

Resilient hexapod robot

2017

In this paper, we present a method of learning desired behaviour of the specific robotic system and transfer of the existing knowledge in the event of partial system failure. Six-legged robot (hexapod) built on top of the Bioloid platform is used for the method verification. We use genetic algorithms to optimize the hexapod's gait, after which we simulate physical damage caused to the robot. The goal of this method is to optimize the gait in accordance with the actual robot morphology, instead of the assumed one. Also, knowledge that was previously gained will be transferred in order to improve the results. Nonstandard genetic algorithm with the specific mixed population is used for this.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRobot kinematicseducation.field_of_studyHexapodControl and OptimizationEvent (computing)PopulationControl engineeringMicrocontrollerGait (human)machine learningComputer Networks and CommunicationGenetic algorithmArtificial IntelligenceGenetic algorithmRoboteducationresilienceInformation Systems
researchProduct

The Robotic Construction Kit as a Tool for Cognitive Stimulation in Children and Adolescents: The RE4BES Protocol

2019

Through numerous experiences, the robotics has been demonstrated to have good potential in the field of strengthening social skills in children with Special Educational Needs and in particular with autism spectrum disorder. There are still not many experimental studies on the cognitive enhancement and social skills of children with special needs conducted with robotics construction kits that, requiring both the construction of the robot body and the programming of its “mind“, bring into play a multiplicity of cognitive and social skills. For the aforementioned reasons our team from the University of Palermo and from the Center MetaIntelligenze ONLUS developed the treatment protocol RE4BES, …

Settore M-PSI/01 - Psicologia Generale0209 industrial biotechnologyControl and Optimizationlearning disorders020205 medical informaticslcsh:Mechanical engineering and machineryApplied psychologySpecial needscognitive stimulation02 engineering and technologySettore M-PSI/04 - Psicologia Dello Sviluppo E Psicologia Dell'Educazione020901 industrial engineering & automationSocial skillsArtificial IntelligenceEducational robotics0202 electrical engineering electronic engineering information engineeringlcsh:TJ1-1570Cognitive rehabilitation therapyspecial needsProtocol (object-oriented programming)educational roboticsbusiness.industryMechanical EngineeringCognitionRoboticseducational robotics cognitive stimulation cognitive rehabilitation learning disorders special needsRobotArtificial intelligencecognitive rehabilitationPsychologybusinessRobotics
researchProduct

New Energy Corridors in the Euro-Mediterranean Area: The Pivotal Role of Sicily

2018

The present paper deals with the new opportunities deriving from the interconnections of the European and North African transmission systems. In order to achieve a single international market for electricity exchanges, interconnections between networks in different countries are becoming increasingly important and Sicily, for its geographical position in the middle of the Mediterranean Sea, will undoubtedly play an important role as an electrical bridge between Europe and the North Africa in the near future. The paper, presenting the actual electro-energetic context of Tunisia, reports the new important interconnection already realized in South Italy (in particular in Sicily) and describe t…

Sicily–Italy doubling connectionControl and OptimizationEUMENA (European Union-Middle East and North Africa)020209 energyNew energyEnergy Engineering and Power TechnologyContext (language use)02 engineering and technologylcsh:Technologytransmission systemRES integrationMediterranean seaOrder (exchange)Sicily–Malta interconnection line0202 electrical engineering electronic engineering information engineeringRegional scienceElectrical and Electronic EngineeringEngineering (miscellaneous)Mediterranean interconnectionlcsh:TRenewable Energy Sustainability and the Environmentbusiness.industryTransmission systemGridSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaGeographyPosition (finance)Electricitybusinesstransmission systemsEnergy (miscellaneous)Energies
researchProduct

Computing the Arrangement of Circles on a Sphere, with Applications in Structural Biology

2009

International audience; Balls and spheres are the simplest modeling primitives after affine ones, which accounts for their ubiquitousness in Computer Science and Applied Mathematics. Amongst the many applications, we may cite their prevalence when it comes to modeling our ambient 3D space, or to handle molecular shapes using Van der Waals models. If most of the applications developed so far are based upon simple geometric tests between balls, in particular the intersection test, a number of applications would obviously benefit from finer pieces of information. Consider a sphere $S_0$ and a list of circles on it, each such circle stemming from the intersection between $S_0$ and another spher…

Single passSpheresControl and Optimization0102 computer and information sciences[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG]01 natural sciencesArrangement of circlesDockingmolecular surfacesCombinatorics03 medical and health sciencesVan der Waals modelsConformational ensembles030304 developmental biologyMathematics0303 health sciencesOptimization algorithmData structureComputer Science ApplicationsAlgebraComputational Mathematics[INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG]Computational Theory and MathematicsStructural biology010201 computation theory & mathematicsBall (bearing)[ INFO.INFO-CG ] Computer Science [cs]/Computational Geometry [cs.CG]SPHERESGeometry and TopologyAffine transformationflexible docking
researchProduct

Network-Based Computational Techniques to Determine the Risk Drivers of Bank Failures During a Systemic Banking Crisis

2018

This paper employs a computational model of solvency and liquidity contagion assessing the vulnerability of banks to systemic risk. We find that the main risk drivers relate to the financial connections a bank has and the market concentration, apart from the size of the bank triggering the contagion, while balance sheets play only a minor role. We also find that market concentration might facilitate banks to withstand liquidity shocks better while exposing them to larger solvency chocks. Our results are validated through an out-of-sample forecasting that shows that both type I and type II prediction errors are reduced if we include network characteristics in our prediction model.

Solvencyinterbank loansliquidityControl and OptimizationVulnerabilitybank failureMonetary economicsMarket concentrationNetwork topologynetwork topologySolvencyComputer Science ApplicationsMarket liquidityComputational Mathematicsbanking crisesArtificial Intelligencesystemic crisissystemic riskSystemic riskBalance sheetBusinessBank failureIEEE Transactions on Emerging Topics in Computational Intelligence
researchProduct

Modeling and Experimental Validation of a Voltage-Controlled Split-Pi Converter Interfacing a High-Voltage ESS with a DC Microgrid

2023

The Split-pi converter can suitably interface an energy storage system (ESS) with a DC microgrid when galvanic isolation is not needed. Usually, the ESS voltage is lower than the grid-side voltage. However, limitations in terms of the ESS current make the use of a high-voltage ESS unavoidable when high power levels are required. In such cases, the ESS voltage can be higher than the microgrid voltage, especially with low microgrid voltages such as 48 V. Despite its bidirectionality and symmetry, the Split-pi exhibits a completely different dynamic behavior if its input and output ports are exchanged. Thus, the present work aims to model the Split-pi converter operating with an ESS voltage hi…

Split-pidroop controlControl and OptimizationRenewable Energy Sustainability and the Environmentenergy storage systemfeed-forward controlEnergy Engineering and Power TechnologyBuilding and ConstructionSplit-pi bidirectional converter energy storage system droop control feed-forward control DC microgridbidirectional converterSettore ING-INF/04 - AutomaticaDC microgridElectrical and Electronic EngineeringEngineering (miscellaneous)Energy (miscellaneous)
researchProduct

Strengthened splitting methods for computing resolvents

2021

In this work, we develop a systematic framework for computing the resolvent of the sum of two or more monotone operators which only activates each operator in the sum individually. The key tool in the development of this framework is the notion of the “strengthening” of a set-valued operator, which can be viewed as a type of regularisation that preserves computational tractability. After deriving a number of iterative schemes through this framework, we demonstrate their application to best approximation problems, image denoising and elliptic PDEs. FJAA and RC were partially supported by the Ministry of Science, Innovation and Universities of Spain and the European Regional Development Fund …

Splitting algorithmControl and Optimization0211 other engineering and technologies47H05 90C30 65K05Elliptic pdesMonotonic function02 engineering and technology01 natural sciencesMonotone operatorOperator (computer programming)Development (topology)Estadística e Investigación OperativaFOS: Mathematics0101 mathematicsImage denoisingResolventMathematics - Optimization and ControlMathematicsResolvent021103 operations researchApplied Mathematics010102 general mathematicsAlgebraComputational MathematicsMonotone polygonOptimization and Control (math.OC)StrengtheningKey (cryptography)Computational Optimization and Applications
researchProduct

On-line Construction of Two-Dimensional Suffix Trees

1999

AbstractWe say that a data structure is builton-lineif, at any instant, we have the data structure corresponding to the input we have seen up to that instant. For instance, consider the suffix tree of a stringx[1,n]. An algorithm building iton-lineis such that, when we have read the firstisymbols ofx[1,n], we have the suffix tree forx[1,i]. We present a new technique, which we refer to asimplicit updates, based on which we obtain: (a) an algorithm for theon-lineconstruction of the Lsuffix tree of ann×nmatrixA—this data structure is the two-dimensional analog of the suffix tree of a string; (b) simple algorithms implementing primitive operations forLZ1-typeon-line losslessimage compression m…

Statistics and ProbabilityCompressed suffix arrayNumerical AnalysisControl and OptimizationAlgebra and Number TheoryTheoretical computer scienceApplied MathematicsGeneral MathematicsSuffix treeString (computer science)Generalized suffix treelaw.inventionLongest common substring problemTree (data structure)lawSuffixAlgorithmFM-indexMathematicsJournal of Complexity
researchProduct

The rank of random regular digraphs of constant degree

2018

Abstract Let d be a (large) integer. Given n ≥ 2 d , let A n be the adjacency matrix of a random directed d -regular graph on n vertices, with the uniform distribution. We show that the rank of A n is at least n − 1 with probability going to one as n grows to infinity. The proof combines the well known method of simple switchings and a recent result of the authors on delocalization of eigenvectors of A n .

Statistics and ProbabilityControl and OptimizationUniform distribution (continuous)General Mathematics0102 computer and information sciencesrandom matrices01 natural sciencesCombinatoricsIntegerFOS: Mathematics60B20 15B52 46B06 05C80Rank (graph theory)Adjacency matrix0101 mathematicsEigenvalues and eigenvectorsMathematicsNumerical AnalysisAlgebra and Number TheoryDegree (graph theory)Applied MathematicsProbability (math.PR)010102 general mathematicsrandom regular graphssingularity probabilityrank010201 computation theory & mathematicsRegular graphRandom matrixMathematics - ProbabilityJournal of Complexity
researchProduct