Search results for "Telecommunication"

showing 10 items of 1769 documents

Deep Motion Model for Pedestrian Tracking in 360 Degrees Videos

2019

This paper proposes a deep convolutional neural network (CNN) for pedestrian tracking in 360◦ videos based on the target’s motion. The tracking algorithm takes advantage of a virtual Pan-Tilt-Zoom (vPTZ) camera simulated by means of the 360◦ video. The CNN takes in input a motion image, i.e. the difference of two images taken by using the vPTZ camera at different times by the same pan, tilt and zoom parameters. The CNN predicts the vPTZ camera parameter adjustments required to keep the target at the center of the vPTZ camera view. Experiments on a publicly available dataset performed in cross-validation demonstrate that the learned motion model generalizes, and that the proposed tracking algo…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni360 degree videobusiness.industryComputer scienceTrackingComputer Science::Neural and Evolutionary ComputationComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020206 networking & telecommunications02 engineering and technologyPedestrianTracking (particle physics)Convolutional neural networkMotion (physics)Motion0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessCNNequirectangularComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Smart Auctions for Autonomic Ambient Intelligence Systems

2020

The main goal of Ambient Intelligence (AmI) is to support users in their daily activities by satisfying and anticipating their needs. To achieve such goal, AmI systems rely on physical infrastructures made of heterogenous sensing devices which interact in order to exchange information and perform monitoring tasks. In such a scenario, a full achievement of AmI vision would also require the capability of the system to autonomously check the status of the infrastructure and supervise its maintenance. To this aim, in this paper, we extend some previous works in order to allow the self-management of AmI devices enabling them to directly interact with maintenance service providers. In particular,…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceAmbient IntelligenceComputer sciencebusiness.industryMulti-agent systemSmart Contracts.020206 networking & telecommunications02 engineering and technologyTrusted ComputingService providerTrusted third partyComputer securitycomputer.software_genreMaintenance engineeringHome automation0202 electrical engineering electronic engineering information engineeringCommon value auction020201 artificial intelligence & image processingbusinesscomputer2020 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

An Adaptive Bayesian System for Context-Aware Data Fusion in Smart Environments

2017

The adoption of multi-sensor data fusion techniques is essential to effectively merge and analyze heterogeneous data collected by multiple sensors, pervasively deployed in a smart environment. Existing literature leverages contextual information in the fusion process, to increase the accuracy of inference and hence decision making in a dynamically changing environment. In this paper, we propose a context-aware, self-optimizing, adaptive system for sensor data fusion, based on a three-tier architecture. Heterogeneous data collected by sensors at the lowest tier are combined by a dynamic Bayesian network at the intermediate tier, which also integrates contextual information to refine the infe…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceComputer Networks and CommunicationsComputer scienceIntelligent decision support systemInferenceBayesian network020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor fusioncomputer.software_genreActivity recognitionEnergy conservationContext Data integration Intelligent sensors Sensor phenomena and characterization Bayes methods Energy consumptionIntelligent sensor0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentData miningElectrical and Electronic EngineeringWireless sensor networkcomputerSoftwareDynamic Bayesian networkIEEE Transactions on Mobile Computing
researchProduct

A Hybrid Framework for Soft Real-Time WSN Simulation

2009

The design of a wireless sensor network is a chal- lenging task due to its intrinsically application-specific nature. Although a typical choice for testing such kind of networks requires devising ad-hoc testbeds, this is often impractical as it depends on expensive, and hard to maintain deployment of nodes. On the other hand, simulation is a valuable option, as long as the actual functioning conditions are reliably modeled, and carefully replicated. The present work describes a framework for supporting the user in early design and testing of a wireless sensor network with an augmented version of TOSSIM, the de-facto standard for simulators, that allows merging actual and virtual nodes seaml…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceDistributed computingLoad modelingReal-time computingData modelingTask (computing)Key distribution in wireless sensor networksTelecommunication computingSoftware deploymentCode (cryptography)Soft-real timeWireless sensor networkWireless Sensor NetworkSimulation
researchProduct

A knowledge based architecture for the virtual restoration of ancient photos

2017

Abstract Historical images are essential documents of the recent past. Nevertheless, time and bad preservation corrupt their physical supports. Digitization can be the solution to extend their “lives”, and digital techniques can be used to recover lost information. This task is often difficult and time-consuming, if commercial restoration tools are used for the purpose. A new solution is proposed to help non-expert users in restoring their damaged photos. First, we defined a dual taxonomy for the defects in printed and digitized photos. We represented our restoration domain with an ontology and we created some rules to suggest actions to perform in case of some specific events. Classes and …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer sciencebusiness.industryProcess (engineering)Interface (Java)020206 networking & telecommunications02 engineering and technologyOntology (information science)Task (project management)Domain (software engineering)World Wide WebImage restoration Historical photos Digitization Ontology Knowledge baseKnowledge baseArtificial IntelligenceSignal Processing0202 electrical engineering electronic engineering information engineeringWeb application020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionbusinessImage restoration Historical photos Digitization Ontology Knowledge baseSoftwareDigitizationPattern Recognition
researchProduct

A hybrid system for malware detection on big data

2018

In recent years, the increasing diffusion of malicious software has encouraged the adoption of advanced machine learning algorithms to timely detect new threats. A cloud-based approach allows to exploit the big data produced by client agents to train such algorithms, but on the other hand, poses severe challenges on their scalability and performance. We propose a hybrid cloud-based malware detection system in which static and dynamic analyses are combined in order to find a good trade-off between response time and detection accuracy. Our system performs a continuous learning process of its models, based on deep networks, by exploiting the growing amount of data provided by clients. The prel…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniControl and OptimizationExploitComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingBig dataFeature extraction020206 networking & telecommunicationsCloud computing02 engineering and technologyStatic analysiscomputer.software_genreArtificial IntelligenceHybrid systemScalability0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingbusinesscomputerIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

A Simulation Framework for Evaluating Distributed Reputation Management Systems

2016

In distributed environments, where interactions involve unknown entities, intelligent techniques for estimating agents’ reputation are required. Reputation Management Systems (RMSs) aim to detect malicious behaviors that may affect the integrity of the virtual community. However, these systems are highly dependent of the application domain they address; hence the evaluation of different RMSs in terms of correctness and resistance to security attacks is frequently a tricky task. In this work we present a simulation framework to support researchers in the assessment of a RMS. The simulator is organized in two logic layers where network nodes are mapped to system processes that implement the i…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCorrectnessComputer scienceDistributed computingmedia_common.quotation_subjectComputer Science (all)Message Passing InterfaceSimulation framework020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreTask (project management)Distributed reputation managementControl and Systems EngineeringApplication domain020204 information systemsSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringMultiagent systemcomputerReputation managementVirtual communityReputationmedia_common
researchProduct

DC4CD

2017

In this article, we present Distributed Computing for Constrained Devices (DC4CD), a novel software architecture that supports symbolic distributed computing on wireless sensor networks. DC4CD integrates the functionalities of a high-level symbolic interpreter, a compiler, and an operating system, and includes networking abstractions to exchange high-level symbolic code among peer devices. Contrarily to other architectures proposed in the literature, DC4CD allows for changes at runtime, even on deployed nodes of both application and system code. Experimental results show that DC4CD is more efficient in terms of memory usage than existing architectures, with which it also compares well in te…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDistributed symbolic processing Forth high-level event handling inter- pretation and compilation of symbolic code on resource-constrained devices wireless programming of sensor network nodesSystem codeComputer scienceDistributed computing020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologySymbolic codecomputer.software_genreHardware and Architecture0202 electrical engineering electronic engineering information engineeringCompilerSoftware architectureWireless sensor networkcomputerSoftwareInterpreterACM Transactions on Embedded Computing Systems
researchProduct

A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices

2019

The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitComputer Networks and CommunicationsComputer sciencebusiness.industryBandwidth (signal processing)Activity tracker020206 networking & telecommunicationsCloud computing02 engineering and technologyActivity recognitionHuman–computer interactionHuman activity recognition mobile crowdsensing fog computing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentbusinessMobile deviceWearable technologyACM Transactions on Internet Technology
researchProduct

A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

2019

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceDistributed algorithmComputer scienceMulti-agent systemQuality of servicemedia_common.quotation_subjectNetwork simulation020206 networking & telecommunications02 engineering and technologycomputer.software_genreVariety (cybernetics)Simulation softwareDistributed systems security.Risk analysis (engineering)Software deploymentRobustness (computer science)020204 information systems0202 electrical engineering electronic engineering information engineeringDisseminationcomputerReputationmedia_common
researchProduct