Search results for "Telecommunication"
showing 10 items of 1769 documents
An Innovative Statistical Tool for Automatic OWL-ERD Alignment
2016
Aligning two representations of the same domain with different expressiveness is a crucial topic in nowadays semantic web and big data research. OWL ontologies and Entity Relation Diagrams are the most widespread representations whose alignment allows for semantic data access via ontology interface, and ontology storing techniques. The term ""alignment" encompasses three different processes: OWL-to-ERD and ERD-to-OWL transformation, and OWL-ERD mapping. In this paper an innovative statistical tool is presented to accomplish all the three aspects of the alignment. The main idea relies on the use of a HMM to estimate the most likely ERD sentence that is stated in a suitable grammar, and corre…
High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices
2015
While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but effective paradigm of …
Three-dimensional matching based resource provisioning for the design of low-latency heterogeneous IoT networks
2019
Internet-of-Things (IoT) is a networking architecture where promising, intelligent services are designed via leveraging information from multiple heterogeneous sources of data within the network. However, the availability of such information in a timely manner requires processing and communication of raw data collected from these sources. Therefore, the economic feasibility of IoT-enabled networks relies on the efficient allocation of both computational and communication resources within the network. Since fog computing and 5G cellular networks approach this problem independently, there is a need for joint resource-provisioning of both communication and computational resources in the networ…
SESAMO: An integrated framework for gathering, managing and sharing environmental data
2016
ICT systems are widely adopted for environmental management, but existing solutions address limited tasks and compose a plethora of heterogeneous tools, which impose a great additional effort on the operators. This work presents SESAMO, a novel framework to provide the operators with a unique tool for gathering, managing and merging environmental and territorial data. SESAMO uses WSNs for providing pervasive monitoring of environmental phenomena and exploits a multi-tier infrastructure in order to integrate data coming from heterogeneous information sources.
A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems
2009
The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management a…
Human Mobility Simulator for Smart Applications
2019
Several issues related to Smart City development require the knowledge of accurate human mobility models, such as in the case of urban development planning or evacuation strategy definition. Nevertheless, the exploitation of real data about users' mobility results in severe threats to their privacy, since it allows to infer highly sensitive information. On the contrary, the adoption of simulation tools to handle mobility models allows to neglect privacy during the design of location-based services. In this work, we propose a simulation tool capable of generating synthetic datasets of human mobility traces; then, we exploit them to evaluate the effectiveness of algorithms which aim to detect…
A machine learning approach for user localization exploiting connectivity data
2016
The growing popularity of Location-Based Services (LBSs) has boosted research on cheaper and more pervasive localization systems, typically relying on such monitoring equipment as Wireless Sensor Networks (WSNs), which allow to re-use the same instrumentation both for monitoring and for localization without requiring lengthy off-line training. This work addresses the localization problem, exploiting knowledge acquired in sample environments, and extensible to areas not considered in advance. Localization is turned into a learning problem, solved by a statistical algorithm. Additionally, parameter tuning is fully automated thanks to its formulation as an optimization problem based only on co…
A Multimodal Fruition Model for Graphical Contents in Ancient Books
2016
One of the most common and efficient way to preserve ancient books is to digitize them, and make their content someway browsable. However, this process often does not take into account the fruition point of view. Exploiting the currently available technologies allows for new ways of content fruition, to attract more people and help them to better understand the available information. In this paper, we present a solution for an innovative and multimodal exploration of ancient books contents, using both touch and touchless gestures. This allows people for both near and far distance interaction, which results in different interaction models.
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Evaluating Correlations in IoT Sensors for Smart Buildings
2021
International audience; In this paper we introduce a dataset of environmental information obtained via indoor and outdoor sensors deployed in the SMART Infrastructure Facility of the University of Wollongong (Australia). The acquired dataset is also made open-sourced along with this paper. We also propose a novel approach based on an evolutionary algorithm to determine pairs of correlated sensors. We compare our approach with three other standard techniques on the same dataset: on average, the accuracy of the evolutionary method is about 62,92%. We also evaluate the computational time, assessing the suitability of the proposed pipeline for real-time applications.