30 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
Language operator: and / or
Date operator: and / or
Rights operator: and / or
2024 Journal article Open Access OPEN
A free interactive digital tool to introduce particle model of matter and thermal particle motion at middle school level
Belli D., Lischi G., Pardini G., Milazzo P., Domenici V.
This technology report presents the main features of a free digital educational tool which aims to introduce middle school level students to the comprehension of the particulate nature of matter in the three states (i.e., solid, liquid, and gas) and during phase transitions. This digital tool is available and is freely accessible online. Its utility was tested during a pilot study involving several classes of two middle schools with 103 students of sixth and seventh grades. Didactic activities were designed to introduce the particle model of matter and to reach several educational objectives, such as the understanding of the thermal motion of particles and the role of temperature, the changes occurring at phase transitions, and the state diagrams. An activity was also tested with seventh grade students where the solidification and melting of tert-butyl alcohol were first investigated during a cooperative inquiry-based laboratory and then elaborated on and consolidated by using this digital tool. This activity demonstrates how introducing digital tools into the learning process can help students better understand and visualize abstract concepts such as state diagrams. The level of students’ engagement and the appreciation of schools’ teachers confirmed the usefulness of this digital tool to teach and learn a key concept of chemistry as the particulate nature of matter.Source: JOURNAL OF CHEMICAL EDUCATION, vol. 101 (issue 2), pp. 647-652
DOI: 10.1021/acs.jchemed.3c00986
Metrics:


See at: CNR IRIS Open Access | pubs.acs.org Open Access | Journal of Chemical Education Restricted | Archivio della Ricerca - Università di Pisa Restricted | CNR IRIS Restricted | Archivio della Ricerca - Università di Pisa Restricted


2023 Contribution to book Restricted
Sviluppo di applicazioni interattive per insegnare la chimica nelle scuole secondarie di I grado
Belli D., Domenici V., Lischi G., Milazzo P., Pardini G.
Il capitolo introduce i passaggi che hanno portato alla realizzazione di un artefatto digitale pensato per spiegare agli alunni delle scuole secondarie di primo grado concetti quali materia, stato di aggregazione e passaggio di stato. In questo contesto sono giustificati gli strumenti informatici utilizzati sia in funzione della penetrazione delle tecnologie dell'informazione e della comunicazione all'interno del tessuto scolastico italiano, sia in funzione delle problematiche in cui i discenti possono imbattersi nella fase di apprendimento.

See at: CNR IRIS Restricted | CNR IRIS Restricted | www.pisauniversitypress.it Restricted


2021 Other Open Access OPEN
4SECURail - Technical Informative Note 15 - Progress Report: Formal development Demonstrator Prototype
Mazzanti F, Belli D
This Technical Informative Note describes the progress of the activity of Work Package 2 / Task 2.3 in the months 12-17 of the project 4SECURail. The final results of Task 2.3 will be described in Deliverable 2.5, due at month 20 (end of July 2021). This Technical Informative Note is likely to already contain most of the interesting results that will appear in the final deliverable, together with other less important internal progress details that for readability issues will not appear in the final version. The overall final purpose of the whole experimentation is the observation of the impact, in our specific case, i.e. applying our specific tools and methodologies1 to our specific case study2, of the adoption of formal methods towards the improvement of the quality of the system specifications under construction.Project(s): 4SECURAIL via OpenAIRE

See at: CNR IRIS Open Access | ISTI Repository Open Access | CNR IRIS Restricted


2021 Other Open Access OPEN
4SECURail - Revised requirements of the 4SECURail case study
Mazzanti F, Belli D
The final version of the system requirements of the case study used in the 4SECURail demonstratorDOI: 10.5281/zenodo.5541217
Project(s): 4SECURAIL via OpenAIRE
Metrics:


See at: CNR IRIS Open Access | ISTI Repository Open Access | CNR IRIS Restricted


2021 Software Open Access OPEN
Formal models of the SAI/CSL system of the 4SECURail case study
Mazzanti F, Belli D
Formal models of 4SECURAIL case study in the notation accepted by UMC, ProB, CADP/LNTDOI: 10.5281/zenodo.5541307
Project(s): 4SECURAIL via OpenAIRE
Metrics:


See at: CNR IRIS Open Access | CNR IRIS Restricted


2021 Software Open Access OPEN
The UMC2LNT and UMC2PROB model transformation tools
Mazzanti F, Belli D
This documents contains the source code of two trasformation tools used in the 4SECURail project. The tools umc2lnt takes as argument the name of a file contining an UMC model and generates the corresponding CADP/LNT model.DOI: 10.5281/zenodo.5541350
Project(s): 4SECURAIL via OpenAIRE
Metrics:


See at: CNR IRIS Open Access | CNR IRIS Restricted


2021 Other Open Access OPEN
4SECURail - Formal development demonstrator prototype, final release
Mazzanti F, Belli D
This Deliverable describes the final results of Task 2.3 of 4SECURail project. The goal of Task 2.3 is to apply the formal development demonstrator process defined in Task 2.1 to the signalling case study defined in Task 2.2 and to describe the observed impact of the selected tools and methodologies for improving the quality of the system specifications under analysis.Project(s): 4SECURAIL via OpenAIRE

See at: CNR IRIS Open Access | ISTI Repository Open Access | CNR IRIS Restricted


2022 Conference article Open Access OPEN
Formal modeling and initial analysis of the 4SECURail case study
Mazzanti F, Belli D
We present the case study developed in the context of the 4SECURail project and the approach used for its formal modeling and analysis. Starting from a simple SysML/UML behavioral model of the system requirements, three formal models have been developed using three different frameworks, namely UMC, ProB, and CADP/LNT. The paper shows how the different ways to represent and analyze the system from the three different points of view allow us to take advantage of the resulting diversity.Source: ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, pp. 118-144. Munich, DE, 01/04/2022
DOI: 10.4204/eptcs.355.6
Project(s): 4SECURAIL via OpenAIRE
Metrics:


See at: eptcs.web.cse.unsw.edu.au Open Access | CNR IRIS Open Access | ISTI Repository Open Access | CNR IRIS Restricted


2022 Software Restricted
Multivariate time series dataset generator
Belli D, Miori V
Una classe Java che fornisce i costruttori e i metodi per generare data set sintetici di serie temporali multi-variate con o senza anomalie. La classe Random è usata per aggiungere la giusta percentuale di aleatorietà alla generazione dei segnali che compongono il data set. Gli schemi temporali sono stati modellati in base a funzioni trigonometriche (i.e., seno e coseno), selezionate casualmente da caratteristica a caratteristica. Per riprodurre le anomalie, viene aggiunto un po' di rumore ai segnali generati. La classe è stata pensata per testare algoritmi di apprendimento automatico sviluppati per l'individuazione di anomalie in serie temporali multi-variate.

See at: github.com Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2023 Contribution to book Open Access OPEN
A case study in formal analysis of system requirements
Belli D, Mazzanti F
One of the goals of the 4SECURail project has been to demonstrate the benefits, limits, and costs of introducing formal meth- ods in the system requirements definition process. This has been done, on an experimental basis, by applying a specific set of tools and method- ologies to a case study from the railway sector. The paper describes the approach adopted in the project and some considerations resulting from the experience.DOI: 10.1007/978-3-031-26236-4_14
Project(s): 4SECURAIL via OpenAIRE
Metrics:


See at: CNR IRIS Open Access | link.springer.com Open Access | ISTI Repository Open Access | doi.org Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2022 Conference article Open Access OPEN
The 4SECURail formal methods demonstrator
Mazzanti F, Belli D
The need for high-quality standard interfaces is widely recognized as a mandatory step to reduce procurement costs and create safely operating complex railway infrastructures. That is why European initiatives like EULYNX have been set up precisely with the purpose of supporting standard interfaces development. The exploitation of formal methods during the phase of standardization plays an essential role in raising the quality of the generated specifications. 4SECURail is a recent project that aims to precisely show, with a structured evaluation (known as the formal methods demonstrator), how formal methods might help to improve the quality of a specific signalling interface selected as case study. This paper describes the experience gained with the experiment.DOI: 10.1007/978-3-031-05814-1_11
DOI: 10.5281/zenodo.6245955
DOI: 10.5281/zenodo.6245956
Project(s): 4SECURAIL via OpenAIRE
Metrics:


See at: ZENODO Open Access | ZENODO Open Access | CNR IRIS Open Access | link.springer.com Open Access | ISTI Repository Open Access | doi.org Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2023 Other Restricted
A byzantine-resilient aggregation scheme for federated learning via matrix autoregression on client updates
Tolomei G., Gabrielli E., Belli D., Miori V.
In this work, we propose FLANDERS, a novel federated learning (FL) aggregation scheme robust to Byzantine attacks. FLANDERS considers the local model updates sent by clients at each FL round as a matrix-valued time series. Then, it identifies malicious clients as outliers of this time series by comparing actual observations with those estimated by a matrix autoregressive forecasting model. Experiments conducted on several datasets under different FL settings demonstrate that FLANDERS matches the robustness of the most powerful baselines against Byzantine clients. Furthermore, FLANDERS remains highly effective even under extremely severe attack scenarios, as opposed to existing defense strategies.

See at: arxiv.org Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2018 Conference article Open Access OPEN
A social-based approach to mobile edge computing
Belli D, Chessa S, Foschini L, Girolami M
Mobile Edge Computing (MEC) opens to the opportunity of moving high-volumes of data from the cloud to locations where the information is actually accessed. In turn, the combination of MEC with the Mobile Crowdsensing approach, using a restricted number of devices with respect the number of base stations, matches the performance of the conventional MEC middleware layer ensuring the same spatial coverage. In this work, we envision a MEC architecture composed by mobile and fixed edges. Their goal is to optimize the share of contents among users by exploiting their mobility and sociality. We first present an algorithm to identify a suitable set of mobile edges and we show how such selection increases the performance of a content-sharing scenario. Our experiments are based on the ParticipAct dataset, which captures the mobility of about 170 users for 10 months. The experiments show that the number of requests that can be served mobile edges is similar to that of requests served by fixed edges, and then that mobile edges can be considered a viable (and lowcost) alternative to fixed edges.Source: PROCEEDINGS - IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, pp. 00292-00297
DOI: 10.1109/iscc.2018.8538763
Metrics:


See at: CNR IRIS Open Access | ieeexplore.ieee.org Open Access | ISTI Repository Open Access | doi.org Restricted | Archivio istituzionale della ricerca - Alma Mater Studiorum Università di Bologna Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2019 Journal article Restricted
Collaborative service discovery in mobile social networks
Girolami M, Belli D, Chessa S
Mobile social networking is a recent paradigm arisen from the wide spread of mobile and wearable devices. Based on the short-range communication interfaces of these devices it is possible to establish opportunistic communications among them and build networks independent to the global one. Challenges introduced by this new type of networks are related to the sharing of resources and services and to the exploitation of the communication opportunities among devices. Limit of existing algorithms, that have sought to fill these shortages, is the lack of attention on the main actor of this service-oriented chain, the user. To this purpose, we introduce the COllaborative seRvice DIscovery ALgorithm (CORDIAL) that leverages both mobility and sociality of the users. We evaluate the performance of CORDIAL combined with different routing protocols for opportunistic networks, and we compare it with a benchmark algorithm (S-Flood) based on flooding and another service discovery algorithm designed to leverage mobile social network features, namely, ServIce DiscovEry in Mobile sociAl Networks (SIDEMAN). Our results show that the performance of CORDIAL remains stable with the different routing algorithms and that, in function of the query forwarding strategy triggered, CORDIAL matches the performance of S-Flood in terms of Query Response Time, achieving a better proactivity score with respect S-Flood and SIDEMAN as well.Source: JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, vol. 27 (issue 1), pp. 233-268
DOI: 10.1007/s10922-018-9465-0
Metrics:


See at: Journal of Network and Systems Management Restricted | CNR IRIS Restricted | CNR IRIS Restricted | link.springer.com Restricted


2018 Conference article Restricted
Enhancing mobile edge computing architecture with human-driven edge computing model
Belli D, Chessa S, Foschini L, Girolami M
In an increasingly interconnected world, mobile and wearable devices, through short range communication interfaces and sensors, become needful tools for collecting and disseminating information in high population density environments. In this context Mobile Crowdsensing (MCS), leveraging people's roaming and their devices' resources, raised the citizen from mere walk-on parts to active participant in the knowledge building and data dissemination process. At the same time, Mobile Edge Computing (MEC) architecture has recently enhanced the two-layer cloud-device architectural model easing the exchange of information and shifting most computational cost from devices towards middle-layer proxies, namely, network edges. We introduce Human-driven Edge Computing, a new model which melts together the power of MEC platform and the large-scale sensing of MCS to realize a better data spreading and environmental coverage in smart cities. In addition, it will be briefly discussed the main sociological aspects related to human behavior and how they can influence the exchange of data in large-scale sensor networks.DOI: 10.1109/ie.2018.00023
Metrics:


See at: doi.org Restricted | Archivio istituzionale della ricerca - Alma Mater Studiorum Università di Bologna Restricted | CNR IRIS Restricted | ieeexplore.ieee.org Restricted | CNR IRIS Restricted


2020 Journal article Open Access OPEN
A probabilistic model for the deployment of human-enabled edge computing in massive sensing scenarios
Belli D., Chessa S., Foschini L., Girolami M.
Human-enabled Edge Computing (HEC) is a recent smart city technology designed to combine the advantages of massive Mobile CrowdSensing (MCS) techniques with the potential of Multi-access Edge Computing (MEC). In this context, the architectural hierarchy of the network shifts the management of sensing information close to terminal nodes through the use of intermediate entities (edges) bridging the direct Cloud-Device communication channel. Recent proposals suggest the implementation of those edges, not only employing fixed MEC nodes, but also opportunistically using as edge nodes mobile devices selected among the terminal ones. However, inappropriate selection techniques may lead to an overestimation or an underestimation of the number of nodes to be used in such a layer. In this work, we propose a probabilistic model for the estimation of the number of mobile nodes to be selected as substitutes of fixed ones. The effectiveness of our model is verified with tests performed on real-world mobility traces.Source: IEEE INTERNET OF THINGS JOURNAL, vol. 7 (issue 3), pp. 2421-2431
DOI: 10.1109/jiot.2019.2957835
Metrics:


See at: CNR IRIS Open Access | ieeexplore.ieee.org Open Access | doi.org Restricted | Archivio istituzionale della ricerca - Alma Mater Studiorum Università di Bologna Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2019 Conference article Restricted
Selection of mobile edges for a hybrid crowdsensing architecture
Belli D., Chessa S., Corradi A., Di Paolo G., Foschini L., Girolami M.
Mobile crowdsensing aims at the collection of sensor data on the environment by leveraging personal devices, usually smartphones. Its popularity is due to the ability of reaching capillary even the most remote areas (provided humans live there), with no infrastructure costs. This is possible because it leverages on existing 4G/5G communication infrastructures that are now rapidly evolving towards edge computing models. In this work we address the synergy between mobile crowdsensing and multi-access edge computing by analysing and assessing strategies for the selection of fixed and mobile edges to support the collection of mobile crowdsensing data.DOI: 10.1109/iscc47284.2019.8969597
Metrics:


See at: doi.org Restricted | Archivio istituzionale della ricerca - Alma Mater Studiorum Università di Bologna Restricted | CNR IRIS Restricted | ieeexplore.ieee.org Restricted | CNR IRIS Restricted


2020 Journal article Open Access OPEN
Optimization strategies for the selection of mobile edges in hybrid crowdsensing architectures
Belli D, Chessa S, Corradi A, Foschini L, Girolami M
Communication infrastructures are rapidly evolving to support 5G enabling lower latency, high reliability, and scalability of the network and of the service provisioning. An important element of the 5G vision is Multi- access Edge Computing (MEC), that leverages the availability of powerful and low-cost middle boxes, i.e., MEC nodes, statically deployed at suitable edges of the network to extend the centralized cloud backbone. At the same time, after almost a decade of research, Mobile CrowdSensing (MCS) has established the technology able to collect sensing data on the environment by using personal devices, usually smartphones, as powerful sensing-and-communication platforms. Even though, mutual benefits due to the integration of MEC and Mobile CrowdSensing (MCS) are still largely unexplored. In this paper, we address and analyze the potential of the synergic use of MCS and MEC by thoroughly assessing various strategies for the selection of both traditional Fixed MEC (FMEC) edges as well as human-enabled Mobile MEC (M2EC) edges to support the collection of mobile CrowdSensing data. Collected results quantitatively show the effectiveness of the proposed optimization strategies in elastically scaling the load at edge nodes according to runtime provisioning needs.Source: COMPUTER COMMUNICATIONS, vol. 157, pp. 132-142
DOI: 10.1016/j.comcom.2020.04.006
Metrics:


See at: Archivio istituzionale della ricerca - Alma Mater Studiorum Università di Bologna Open Access | CNR IRIS Open Access | www.sciencedirect.com Open Access | Computer Communications Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2020 Conference article Restricted
Impact of evolutionary community detection algorithms for edge selection strategies
Barsocchi P, Belli D, Chessa S, Foschini L, Girolami M
The combination of the edge computing paradigm with Mobile CrowdSensing (MCS) is a promising approach. However, the selection of the proper edge nodes is a crucial aspect that greatly affects the performance of the extended architecture. This work studies the performance of an edge-based MCS architecture with ParticipAct, a real-word experimental dataset. We present a community-based edge selection strategy and we measure two key metrics, namely latency and the number of requests satisfied. We show how they vary by adopting three evolutionary community detection algorithms, TILES, Infomap and iLCD configured by changing several configuration settings. We also study the two metrics, by varying the number of edge nodes selected so that to show its benefit.DOI: 10.1109/globecom42002.2020.9348085
Metrics:


See at: Archivio istituzionale della ricerca - Alma Mater Studiorum Università di Bologna Restricted | CNR IRIS Restricted | ieeexplore.ieee.org Restricted | CNR IRIS Restricted | CNR IRIS Restricted | xplorestaging.ieee.org Restricted


2021 Journal article Open Access OPEN
How mobility and sociality reshape the context: a decade of experience in mobile crowdsensing
Girolami M, Belli D, Chessa S, Foschini L
The possibility of understanding the dynamics of human mobility and sociality creates the opportunity to re-design the way data are collected by exploiting the crowd. We survey the last decade of experimentation and research in the field of mobile CrowdSensing, a paradigm centred on users' devices as the primary source for collecting data from urban areas. To this purpose, we report the methodologies aimed at building information about users' mobility and sociality in the form of ties among users and communities of users. We present two methodologies to identify communities: spatial and co-location-based. We also discuss some perspectives about the future of mobile CrowdSensing and its impact on four investigation areas: contact tracing, edge-based MCS architectures, digitalization in Industry 5.0 and community detection algorithms.Source: SENSORS (BASEL), vol. 21 (issue 19)
DOI: 10.3390/s21196397
Metrics:


See at: CNR IRIS Open Access | ISTI Repository Open Access | www.mdpi.com Open Access | CNR IRIS Restricted