Search results for "Exploit"
showing 10 items of 284 documents
A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices
2019
The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…
Reputation management in distributed systems
2008
Several distributed applications, implemented over today’s Internet, are based on the assumption that participating agents collaborate in order to achieve their own goal. However, when these applications are modelled as unstructured distributed systems, the greater autonomy and decentralization encourage antisocial behaviours, which are likely to cause performance degradation for the whole system. This paper presents a fully distributed reputation management system that allows the evaluation of agent reputation in unstructured environments without any centralized coordination. The proposed approach is based on game theory and is capable of capturing the highly dynamic nature of the involved…
Synthetic phenomenology and high-dimensional buffer hypothesis
2012
Synthetic phenomenology typically focuses on the analysis of simplified perceptual signals with small or reduced dimensionality. Instead, synthetic phenomenology should be analyzed in terms of perceptual signals with huge dimensionality. Effective phenomenal processes actually exploit the entire richness of the dynamic perceptual signals coming from the retina. The hypothesis of a high-dimensional buffer at the basis of the perception loop that generates the robot synthetic phenomenology is analyzed in terms of a cognitive architecture for robot vision the authors have developed over the years. Despite the obvious computational problems when dealing with high-dimensional vectors, spaces wit…
Exploiting Correlation between Body Gestures and Spoken Sentences for Real-time Emotion Recognition
2017
Humans communicate their affective states through different media, both verbal and non-verbal, often used at the same time. The knowledge of the emotional state plays a key role to provide personalized and context-related information and services. This is the main reason why several algorithms have been proposed in the last few years for the automatic emotion recognition. In this work we exploit the correlation between one's affective state and the simultaneous body expressions in terms of speech and gestures. Here we propose a system for real-time emotion recognition from gestures. In a first step, the system builds a trusted dataset of association pairs (motion data -> emotion pattern), a…
SESAMO: An integrated framework for gathering, managing and sharing environmental data
2016
ICT systems are widely adopted for environmental management, but existing solutions address limited tasks and compose a plethora of heterogeneous tools, which impose a great additional effort on the operators. This work presents SESAMO, a novel framework to provide the operators with a unique tool for gathering, managing and merging environmental and territorial data. SESAMO uses WSNs for providing pervasive monitoring of environmental phenomena and exploits a multi-tier infrastructure in order to integrate data coming from heterogeneous information sources.
Human Mobility Simulator for Smart Applications
2019
Several issues related to Smart City development require the knowledge of accurate human mobility models, such as in the case of urban development planning or evacuation strategy definition. Nevertheless, the exploitation of real data about users' mobility results in severe threats to their privacy, since it allows to infer highly sensitive information. On the contrary, the adoption of simulation tools to handle mobility models allows to neglect privacy during the design of location-based services. In this work, we propose a simulation tool capable of generating synthetic datasets of human mobility traces; then, we exploit them to evaluate the effectiveness of algorithms which aim to detect…
SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications
2020
Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…
A Networking Framework for Multi-Robot Coordination
2008
Autonomous robots operating in real environments need to be able to interact with a dynamic world populated with objects, people, and, in general, other agents. The current generation of autonomous robots, such as the ASIMO robot by Honda or the QRIO by Sony, has showed impressive performances in mechanics and control of movements; moreover, recent literature reports encouraging results about the capability of such robots of representing themselves with respect to a dynamic external world, of planning future actions and of evaluating resulting situations in order to make new plans. However, when multiple robots are supposed to operate together, coordination and communication issues arise; w…
Wi-Dia: Data-Driven Wireless Diagnostic Using Context Recognition
2018
The recent densification of Wi-Fi networks is exacerbating the effects of well-known pathologies including hidden nodes and flow starvation. This paper provides an automatic diagnostic tool for detecting the source roots of performance impairments by recognizing the wireless operating context. Our tool for Wi-Fi diagnostic, named Wi-Dia, exploits machine learning methods and uses features related to network topology and channel utilization, without impact on regular network operations and working in real-time. Real-time per-link Wi-Fi diagnosis enables recovering actions for context-specific treatments. Wi-Dia classifier recognizes different classes of interference; it is jointly trained us…
Tratta di esseri umani e sfruttamento lavorativo in agricoltura: Il caso dei «boschetari» nelle serre del Ragusano
2020
Il saggio prende in esame la decisione del Giudice dell’Udienza Preliminare del Tribunale di Catania riguardante il caso dei "boschetti" nelle serre del ragusano, mettendo in luce la dimensione situazionale della situazione di vulnerabilità delle vittime di sfruttamento lavorativo