112 research outputs found

    ASAP: An Automatic Algorithm Selection Approach for Planning

    Get PDF
    Despite the advances made in the last decade in automated planning, no planner out- performs all the others in every known benchmark domain. This observation motivates the idea of selecting different planning algorithms for different domains. Moreover, the planners’ performances are affected by the structure of the search space, which depends on the encoding of the considered domain. In many domains, the performance of a plan- ner can be improved by exploiting additional knowledge, for instance, in the form of macro-operators or entanglements. In this paper we propose ASAP, an automatic Algorithm Selection Approach for Planning that: (i) for a given domain initially learns additional knowledge, in the form of macro-operators and entanglements, which is used for creating different encodings of the given planning domain and problems, and (ii) explores the 2 dimensional space of available algorithms, defined as encodings–planners couples, and then (iii) selects the most promising algorithm for optimising either the runtimes or the quality of the solution plans

    Retrofit Proposals for Energy Efficiency and Thermal Comfort in Historic Public Buildings: The Case of the Engineering Faculty’s Seat of Sapienza University

    Get PDF
    The building sector greatly contributes to energy consumption and Greenhouse Gas emissions, relating to the whole building life cycle. Boasting a huge building heritage of historical and architectural value, Europe faces challenging retrofit perspectives, as the potential for high energy efficiency has to be exploited while preserving the buildings' original characteristics. The present work aims to feature the influence of a passive strategy on a heritage building in a mild climate. As historical its facade cannot be modified, its large glazing areas involve multiple issues, such as an increase in the heating (QH) and cooling (QC) energy demands and the risk of thermal discomfort. Thus, window replacement was proposed for retrofitting. A dynamic simulation model in TRNSYS was validated with experimental data collected by the continuous monitoring of walls of different thicknesses and orientations. Solutions from replacement with Double Glazing Units (DGUs) with improved thermal insulation, to internal shading activation were applied. All configurations were compared in terms of QH, QC, thermal performance of the building and user comfort (Fanger). Low-e DGU enabled the saving of up to 14% of the annual energy demand, and shading also offered good results in summer, reducing QC by 19%. In summer, DGU involved a maximum PPD reduction of 10 units

    An Efficient Hybrid Planning Framework for In-Station Train Dispatching

    Get PDF
    In-station train dispatching is the problem of optimising the effective utilisation of available railway infrastructures for mitigating incidents and delays. This is a fundamental problem for the whole railway network efficiency, and in turn for the transportation of goods and passengers, given that stations are among the most critical points in networks since a high number of interconnections of trains’ routes holds therein. Despite such importance, nowadays in-station train dispatching is mainly managed manually by human operators. In this paper we present a framework for solving in-station train dispatching problems, to support human operators in dealing with such task. We employ automated planning languages and tools for solving the task: PDDL+ for the specification of the problem, and the ENHSP planning engine, enhanced by domain-specific techniques, for solving the problem. We carry out a in-depth analysis using real data of a station of the North West of Italy, that shows the effectiveness of our approach and the contribution that domain-specific techniques may have in efficiently solving the various instances of the problem. Finally, we also present a visualisation tool for graphically inspecting the generated plans

    Performance evaluation of Attribute-Based Encryption on constrained IoT devices

    Get PDF
    The Internet of Things (IoT) is enabling a new generation of innovative services based on the seamless integration of smart objects into information systems. This raises new security and privacy challenges that require novel cryptographic methods. Attribute-Based Encryption (ABE) is a type of public-key encryption that enforces a fine-grained access control on encrypted data based on flexible access policies. The feasibility of ABE adoption in fully-fledged computing systems, i.e., smartphones or embedded systems, has been demonstrated in recent works. In this paper, we consider IoT devices characterized by strong limitations in terms of computing, storage, and power. Specifically, we assess the performance of ABE in typical IoT constrained devices. We evaluate the performance of three representative ABE schemes configured considering the worst-case scenario on two popular IoT platforms, namely ESP32 and RE-Mote. Our results show that, if we assume to employ up to 10 attributes in ciphertexts and to leverage hardware cryptographic acceleration, then ABE can indeed be adopted on devices with very limited memory and computing power, while obtaining a satisfactory battery lifetime. In our experiments, as also performed in other works in the literature, we consider only the worst-case configuration, which, however, might not be completely representative of the real working conditions of sensors employing ABE. For this reason, we complete our evaluation by proposing a novel benchmark method that we used to complement the experiments by evaluating the average performance. We show that by always considering the worst case, the current literature significantly overestimates the processing time and the energy consumption

    Efficient energy storage in residential buildings integrated with RESHeat system

    Get PDF
    The Renewable Energy System for Residential Building Heating and Electricity Production (RESHeat) system has been realized for heating and cooling residential buildings. The main components of the RESHeat system are a heat pump, photovoltaic modules, sun-tracking solar collectors and photovoltaic/thermal modules, an under-ground thermal energy storage unit, and a ground heat exchanger. One of the main novelties of the RESHeat system is efficient ground regeneration due to the underground energy storage unit. During a heating season, a large amount of heat is taken from the ground. The underground energy storage unit allows the restoration of ground heating capability and the heat pump's coefficient of performance (COP) to be kept high as possible for consecutive years. The paper presents an energy analysis for a residential building that is a RESHeat system demo site, along with integrating the RESHeat system with the building. The experimentally validated components coupled with the building model to achieve the system performance in TRNSYS software. The results show that the yearly average COP of the heat pump is 4.85 due to the underground energy storage unit. The RESHeat system is able to fully cover the heating demand of the building using renewable energy sources and an efficient underground energy storage system

    Evaluation of Feasibility and Impact of Attacks against the 6top Protocol in 6TiSCH Networks

    Get PDF
    The 6TiSCH architecture has been gaining attraction as a promising solution to ensure reliability and security for communication in applications for the Industrial Internet of Things (IIoT). While many different aspects of the architecture have been investigated in literature, an in-depth analysis of the security features included in its design is still missing. In this paper, we assess the security vulnerabilities of the 6top protocol, a core component of the 6TiSCH architecture for enabling network nodes to negotiate communication resources. Our analysis highlights two possible attacks against the 6top protocol that can impair network performance and reliability in a significant manner. To prove the feasibility of the attacks in practice, we implemented both of them on the Contiki-NG Operating System and tested their effectiveness on a simple deployment with three Zolertia RE-Mote sensor nodes. Also, we carried out a set of simulations using Cooja in order to assess their impact on larger networks. Our results show that both attacks reduce reliability in the overall network and increase energy consumption of the network nodes

    Static and Dynamic Portfolio Methods for Optimal Planning: An Empirical Analysis

    Get PDF
    Combining the complementary strengths of several algorithms through portfolio approaches has been demonstrated to be effective in solving a wide range of AI problems. Notably, portfolio techniques have been prominently applied to suboptimal (satisficing) AI planning. Here, we consider the construction of sequential planner portfolios for domainindependent optimal planning. Specifically, we introduce four techniques (three of which are dynamic) for per-instance planner schedule generation using problem instance features, and investigate the usefulness of a range of static and dynamic techniques for combining planners. Our extensive empirical analysis demonstrates the benefits of using static and dynamic sequential portfolios for optimal planning, and provides insights on the most suitable conditions for their fruitful exploitation

    Semantic-based Context Modeling for Quality of Service Support in IoT Platforms

    Get PDF
    The Internet of Things (IoT) envisions billions of devices seamlessly connected to information systems, thus providing a sensing platform for applications. The availability of such a huge number of smart things will entail a multiplicity of devices collecting overlapping data and/or providing similar functionalities. In this scenario, efficient discovery and appropriate selection of things through proper context acquisition and management will represent a critical requirement and a challenge for future IoT platforms. In this work we present a practical approach to model and manage context, and how this information can be exploited to implement QoS-aware thing service selection. In particular, it is shown how context can be used to infer knowledge on the equivalence of thing services through semantic reasoning, and how such information can be exploited to allocate thing services to applications while meeting QoS requirements even in case of failures. The proposed approach is demonstrated through a simple yet illustrative experiment in a smart home scenario.European Commission's FP

    MECPerf: An Application-Level Tool for Estimating the Network Performance in Edge Computing Environments

    Get PDF
    Edge computing is an emerging architecture in 5G networks where computing power is provided at the edge of the fixed network, to be as close as possible to the end users. Computation offloading, better communication latency, and reduction of traffic in the core network are just some of the possible benefits. However, the Quality of Experience (QoE) depends significantly on the network performance of the user device towards the edge server vs. cloud server, which is not known a priori and may generally change very fast, especially in heterogeneous, dense, and mobile deployments. Building on the emergence of standard interfaces for the installation and operation of thirdparty edge applications in a mobile network, such as the MultiAccess Edge Computing (MEC) under standardization at the European Telecommunications Standards Institute (ETSI), we propose MECPerf, a tool for user-driven network performance measurements. Bandwidth and latency on different network segments are measured and stored in a central repository, from where they can be analyzed, e.g., by application and service providers without access to the underlying network management services, for run-time resource optimization
    • 

    corecore