131 research outputs found

    Semantic Support for Log Analysis of Safety-Critical Embedded Systems

    Full text link
    Testing is a relevant activity for the development life-cycle of Safety Critical Embedded systems. In particular, much effort is spent for analysis and classification of test logs from SCADA subsystems, especially when failures occur. The human expertise is needful to understand the reasons of failures, for tracing back the errors, as well as to understand which requirements are affected by errors and which ones will be affected by eventual changes in the system design. Semantic techniques and full text search are used to support human experts for the analysis and classification of test logs, in order to speedup and improve the diagnosis phase. Moreover, retrieval of tests and requirements, which can be related to the current failure, is supported in order to allow the discovery of available alternatives and solutions for a better and faster investigation of the problem.Comment: EDCC-2014, BIG4CIP-2014, Embedded systems, testing, semantic discovery, ontology, big dat

    Semantic Brokering of Multimedia Contents for Smart Delivery of Ubiquitous Services in Pervasive Environments

    Get PDF
    With the proliferation of modern mobile devices having the capability to interact each other and with the environment in a transparent manner, there is an increase in the development of those applications that are specifically designed for pervasive and ubiquitous environments. Those applications are able to provide a service of interest for the user that depends on context information, such as the user's position, his preferences, the capability of the device and its available resources. Services have to respond in a rational way in many different situations choosing the actions with the best expected result by the user, so making environment not only more connected and efficient, but smarter. Here we present a semantic framework that provides the technology for the development of intelligent, context aware services and their delivery in pervasive and ubiquitous environments

    WEUSEDTO—Water End USE Dataset and TOols: An open water end use consumption dataset and data analytics tools

    Get PDF
    Globalization, climate changes, innovative technologies and new human habits have increased atten- tion to water conservation and management. Therefore, behavioural studies became a key element to understand how and when water is used in residential environment. Water End USE Dataset and TOols (WEUSEDTO), an open water end use consumption dataset and data analytics tools, has been released to help researchers, water utilities and companies to test models and algorithms on real water consumption data. The dataset combines with some notebook python able to analyse high-resolution water data (data recorded with 1 sample per second) to provide several tools to manage raw data, compute statistical analysis, learn fixture usage and generate synthetic simulation models. In addition, washbasin flow data were used as a test case to illustrate the main features of WEUSEDTO: providing volume and duration of single events, classifying usages and simulating user’s behaviour

    An architecture for using commodity devices and smart phones in health systems

    Get PDF
    The potential of patient-centred care and a connected eHealth ecosystem can be developed through socially responsible innovative architectures. The purpose of this paper is to define key innovation needs. This is achieved through conceptual development of an architecture for common information spaces with emergent end-user applications by supporting intelligent processing of measurements, data and services at the Internet of Things (IoT) integration level. The scope is conceptual definition, and results include descriptions of social, legal and ethical requirements, an architecture, services and connectivity infrastructures for consumer-oriented healthcare systems linking co-existing healthcare systems and consumer devices. We conclude with recommendations based on an analysis of research challenges related to how to process the data securely and anonymously and how to interconnect participants and services with different standards and interaction protocols, and devices with heterogeneous hardware and software configurations

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF
    Il presente volume nasce come continuazione del precedente, con l’obiettivo di delineare un insieme di ambiti progettuali e di azioni che la comunità nazionale della ricerca ritiene essenziali a complemento e a supporto di quelli previsti nel DPCM Gentiloni in materia di sicurezza cibernetica, pubblicato nel febbraio del 2017. La lettura non richiede particolari conoscenze tecniche; il testo è fruibile da chiunque utilizzi strumenti informatici o navighi in rete. Nel volume vengono considerati molteplici aspetti della cybersecurity, che vanno dalla definizione di infrastrutture e centri necessari a organizzare la difesa alle azioni e alle tecnologie da sviluppare per essere protetti al meglio, dall’individuazione delle principali tecnologie da difendere alla proposta di un insieme di azioni orizzontali per la formazione, la sensibilizzazione e la gestione dei rischi. Gli ambiti progettuali e le azioni, che noi speriamo possano svilupparsi nei prossimi anni in Italia, sono poi accompagnate da una serie di raccomandazioni agli organi preposti per affrontare al meglio, e da Paese consapevole, la sfida della trasformazione digitale. Le raccomandazioni non intendono essere esaustive, ma vanno a toccare dei punti che riteniamo essenziali per una corretta implementazione di una politica di sicurezza cibernetica a livello nazionale. Politica che, per sua natura, dovrà necessariamente essere dinamica e in continua evoluzione in base ai cambiamenti tecnologici, normativi, sociali e geopolitici. All’interno del volume, sono riportati dei riquadri con sfondo violetto o grigio; i primi sono usati nel capitolo introduttivo e nelle conclusioni per mettere in evidenza alcuni concetti ritenuti importanti, i secondi sono usati negli altri capitoli per spiegare il significato di alcuni termini tecnici comunemente utilizzati dagli addetti ai lavori. In conclusione, ringraziamo tutti i colleghi che hanno contribuito a questo volume: un gruppo di oltre 120 ricercatori, provenienti da circa 40 tra Enti di Ricerca e Università, unico per numerosità ed eccellenza, che rappresenta il meglio della ricerca in Italia nel settore della cybersecurity. Un grazie speciale va a Gabriella Caramagno e ad Angela Miola che hanno contribuito a tutte le fasi di produzione del libro. Tra i ringraziamenti ci fa piacere aggiungere il supporto ottenuto dai partecipanti al progetto FILIERASICURA

    A methodology for deployment of IoT application in fog

    No full text
    The foreseen increase of IoT connected to the Internet is worrying the ICT community because of its impact on network Infrastructure when the number of requesters become larger and larger. Moreover also reliability of network connection and real-time constraints can affect the effectiveness of the Cloud Computing paradigm for developing IoT solutions. The necessity of an intermediate layer in the whole IoT architecture that works as a middle ground between the local physical memories and Cloud is proposed by the Fog paradigm. In this paper we define and use a methodology that supports the developer to address the Fog Service Placement Problem, which consists of finding the optimal mapping between IoT applications and computational resources. We exploited and extended a Fog Application model from the related work to apply the proposed methodology in order to investigate the optimal deployment of IoT application. The case study is an IoT application in the Smart Energy domain. In particular, we extended a software platform, which was developed, and released open source by the CoSSMic European project, with advanced functionalities. The new functionalities provide capabilities for automatic learning of energy profiles and lighten the platform utilization by users, but they introduce new requirements, also in terms of computational resources. Experimental results are presented to demonstrate the usage and the effectiveness of the proposed methodology at deployment stage
    • …
    corecore