Browsing Informatica ed Ingegneria dell'Informazione by Submit Date
Now showing items 1-20 of 24
-
Cyber security and ubiquity: an human-centric approach
(Universita degli studi di Salerno, 2017-06-23)Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ... -
Real-time face analysis for gender recognition on video sequences
(Universita degli studi di Salerno, 2018-03-05)This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ... -
A neurocomputational model of reward-based motor learning
(Universita degli studi di Salerno, 2017-09-22)The following thesis deals with computational models of nervous system employed in motor reinforcement learning. The novel contribution of this work is that it includes a methodology of experiments for evaluating learning ... -
Building functional neuromarkers from resting state fMRI to describe physiopathological traits
(Universita degli studi di Salerno, 2018-03-02)The overarching goal of this work has been that of devising novel methods for building functional neuromarkers from resting-state fMRI data to describe healthy and pathological human behaviour. Observing spontaneous ... -
Fuzzy models for group decision making and applications to e-learning and recommender systems
(Universita degli studi di Salerno, 2018-03-08)The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ... -
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ... -
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ... -
Teamwork collaboration around CAE models in an industrial context
(Universita degli studi di Salerno, 2017-09-05)Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ... -
Statistical models for the characterization, identification and mitigation of distributed attacks in data networks
(Universita degli studi di Salerno, 2018-03-09)The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental ... -
Methods and algorithms for power devices losses behavioral modeling
(Universita degli studi di Salerno, 2017-08-07)Power electronics is since decades in the focus of very important technology innovations, as the characteristics and the performances of power supplies can severely condition and limit the performances of the system to ... -
Model Checking Cyber-Physical Systems
(Universita degli studi di Salerno, 2019-03-12)Cyber-Physical Systems (CPSs) are integrations of computation with physical processes. Applications of CPS arguably have the potential to overshadow the 20-th century IT revolution. Nowadays, CPSs application to many ... -
Cognitive Models and Computational Approaches for improving Situation Awareness Systems
(Universita degli studi di Salerno, 2018-03-08)The world of Internet of Things is pervaded by complex environments with smart services available every time and everywhere. In such a context, a serious open issue is the capability of information systems to support ... -
On Provable Security of Entity Authentication Schemes
(Universita degli studi di Salerno, 2019-03-06)Entity authentication is the process allowing a user, in a distributed system, to gain confidence in the identity of one (or more) communication user. Such a process may be either unilateral (the users are involved in a ... -
Improvement in the management of cryptographic keys in a HSM and proposal of an Outdoor Position Certification Authority
(Universita degli studi di Salerno, 2019-03-07)The following doctoral thesis comprises two distinct sections, both describing a specific applied research concerning the macro-theme of computer security. The first section describes a proposal for the improvement and ... -
Methods and algorithms for behavioral modeling of ferrite power inductors
(Universita degli studi di Salerno, 2019-03-12)Information technology allows solving numerous problems regarding all the aspects of everyday life, including technical activities related to the design of devices and systems. In the electronic eld, di erent types of ... -
Empowering computational science through extreme scalability
(Universita degli studi di Salerno, 2021-05-24)Computational science is an ever-expanding research eld. It combines tech- nologies, modern computational methods, and simulations to address prob- lems too complex to be e ectively predicted by theory alone or too ... -
Human multi-robot interaction: from workspace sharing to physical collaboration
(Universita degli studi di Salerno, 2021-04-03)In decentralized systems, the control loop between robots, sensors, actuators and processing units does not close on the same physical device, but through a communication network on which the explicit or implicit exchange ... -
Context-aware knowledge extraction for UV scene understanding
(Universita degli studi di Salerno, 2020-07-18)In the surveillance systems, Unmanned Vehicle (UV) scene inter- pretation is a non-trivial problem, because UVs need to possess human-like common-sense knowledge to correctly interpret events and situations occurring ... -
An Auction-based Approach to Control Automated Warehouses using Smart Vehicles
(Universita degli studi di Salerno, 2020-02-14)In the field of logistics, the study of systems that follow the recommended requirements of the ``Industry 4.0'' is now of paramount importance. Since traditional hierarchical and centralized control architectures have ... -
Dynamic Programming for Optimal Planning and Control of Redundant Robot Manipulators
(Universita degli studi di Salerno, 2020-06-16)Kinematically redundant robots possess more degrees of freedom than those strictly required to execute a given task. Such a charac- teristic gives the system a higher degree of dexterity and mobility that can be exploited ...