The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater robotic swarms have more challenging operating conditions when compared to their ground counterparts. One such major limitation is vastness of the oceanic environment, which significantly increases the possibility of losing swarm members. Although swarms can tolerate losses, if care is not taken in the design of swarm-level behaviors, they can cause a complete failure of the mission. An...
Software-Defined Networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the chances of consulting the SDN controller, which is a slow process. The rules are usually cached in the forwarding plane with a Ternary Content Addressable...
Network attacks are becoming ever more sophisticated and are able to hide more easily in the increasing amount of traffic being generated by everyday activity. Administrators are placed in the unfortunate position of distinguishing between the two. The attack graph has been in use for some time because it provides a concise knowledge representation, and has had successful security metrics developed...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high entropy physical processes, but this is difficult so pseudorandomness is usually substituted for randomness. We introduce improved complexity randomness tests and use them to judge three pseudorandom bit generators; the AES block cipher (standard, strongly believed to be secure), the Dragon stream cipher...
In wireless hostile environments such as tunnels, tall buildings, undergrounds and dense vegetation where Global Positioning System (GPS) signals can be unavailable, vehicles are prevented from exchanging accurate positions. Hence critical information may be lost or misled. To overcome these limitations, this paper proposes an innovative technique for localization estimation called SuPRANO, a Semi-suPervised...
Congestion in today's mobile networks is mainly managed by end to end congestion control algorithms such as TCP. However, in spite of its many merits, TCP does not cope well with the high variability inherent to radio links and customer experience may sometimes be poor as TCP reveals unable to rapidly grasp such a fluctuating bandwidth. To remedy this problem, we introduce in this paper a new proposal...
This paper considers the problem of Base Station power minimization in downlink Orthogonal Frequency Division Multiple Access (OFDMA) systems. It aims at providing new solutions for the reduction of the total energy consumption. Such solutions rely on joint subcarrier and power allocation, under the constraints of requested per-user data rate. Practical results show that the proposed techniques allow...
Ubiquitous Learning Environments (ULEs) - or Technology Rich Classrooms - are created to combine real and virtual learning environments in order to produce richer study artifacts to support both instructors and students in the teaching/learning process. However, they produce a huge volume of Learning Objects (LOs), often unstructured, which makes retrieving and presenting them a challenge, especially...
A Kinect-based feedback system is developed for static balance ability training in this study. It includes three parts: (1) a series of demonstrations of training movements, (2) evaluation of user's gesture, and (3) real time feedback. We tested the feasibility of our feedback system to improve static balance ability with twelve participants. The participants learned and performed three movements...
Community of Inquiry (CoI) model is a framework with socio-constructivist roots, which describes an online learning community on three interdependent components: cognitive presence, social presence and teaching presence. Content analysis is widely used to examine transcripts of computer mediated conversations between students in a community of inquiry. However, there are no dedicated support tools...
We applied a speech-to-text recognition (STR) and computer-aided translation (CAT) systems to support multi-lingual communications students participating in cross-cultural learning project. The participants were engaged in interactions and information exchanges in order to learn and understand cultures and traditions of their peers. Their communications were carried out in their native languages on...
In this paper, a modernized sophomore level course in Electrical Measurements is described. The course is customized to electronics majoring students and recognizes the fact that computers influenced electrical measurements: most of the instruments are microcontroller based nowadays, and all the measurement data are processed by computers, at least to type them down. Eight novel laboratory exercises...
The ability of robotic rehabilitation devices to support paralysed end-users is ultimately limited by the degree to which human-machine-interaction is designed to be effective and efficient in translating user intention into robotic action. Specifically, we evaluate the novel possibility of binocular eye-tracking technology to detect voluntary winks from involuntary blink commands, to establish winks...
Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and...
This paper contains the first considerations of a computer scientist approaching the digital forensic. After some years of consultancies for both judges and parties I developed some thoughts that probably are worthwhile to share.
This paper presents the user-centered design methodologies applied in the ILOCALAPP project, with the aim of designing and developing a mobile application which applies the incidental learning paradigm in the field of foreign cultures and languages. Such methodologies are strongly based on stakeholders' consultations, by involving potential end-users in a dialogue that plays a crucial role in identifying...
We provide a cloud-based journey planner for public transport built upon an efficient core routing engine that updates efficiently timetable information in case of delays. We describe our mobile application along with a service that allows users to assess the suggested journeys offered by the application, built on top of an IoT/FIRE+ infrastructure. Our journey planner contributes to the establishment...
Combining data analytics with homomorphic encryption is an interesting topic, which finds several applications in the healthcare domain because it enables clients with low computational and/or storage capacity to outsource the analysis of potentially large datasets to the cloud while protecting sensitive data from unwanted access. In this work, we propose a framework for evaluating k-means clustering...
Gene-phenotype association prediction can be applied to reveal the inherited basis of human diseases and help drug development. Gene-phenotype associations are related to complex biological process and influenced by various factors, such as relationship between phenotypes and that among genes. While due to sparseness of curated gene-phenotype associations, existing approaches are limited to prediction...
In this paper, a transfer function that models Molecular Communication via Diffusion (MCvD) between a point transmitter and a fully absorbing circular receiver in an unbounded 2-D environment is analytically derived. The analytical derivation of the transfer function of the 2-D channel in MCvD is proposed for the first time in the literature. The transfer function is obtained by solving the molecule...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.