28th August 2014. My presentation at SEAA 2014 (http://esd.scienze.univr.it/dsd-seaa-2014) about our survey on
the specification of the physical environment of Wireless Sensor Networks (WSNs).
Accompanying paper: TO APPEAR
Abstract:
A wireless Sensor Network (WSN) consists of spatially distributed sensor nodes that cooperate in order to accomplish a specific task. What really sets WSNs apart from all the other kinds of distributed systems is the limited processing capabilities of the nodes, contingent energy restrictions, and their strict dependence to physical phenomena like attenuation, reflection, etc. Under this perspective, the physical environment in which WSN nodes are deployed strongly affects the overall quality of the system. Under this perspective, how WSN engineers currently specify the physical environment and how they would like to do it? This paper presents a survey we run by interviewing WSN engineers with a special focus on their practical needs and activities.
By analyzing the collected data, we can conclude that: a) a good number of practitioners describing the physical environment do it by GIS software or informally, b) practitioners not specifying the physical environment do not see a clear return on investment on doing it, c) practitioners rate as (definitely) useful a potential tool for deploying WSN nodes on a virtually specified physical environment.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/10/an-introduction-to-single-photon-avalanche-diodes-a-new-type-of-imager-for-computer-vision-a-presentation-from-the-university-of-wisconsin-madison/
Sebastian Bauer, Postdoctoral Student at the University of Wisconsin – Madison, presents the “Introduction to Single-Photon Avalanche Diodes—A New Type of Imager for Computer Vision” tutorial at the May 2021 Embedded Vision Summit.
The single-photon avalanche diode (SPAD) is an emerging image sensing technology with unique capabilities relevant to computer vision applications. Originally designed for imaging in low-light conditions, the ultra-high time resolution of SPADs also helps to achieve extremely high dynamic range, motion blur-free images and even seeing around corners. The use of SPADs in recent iPhone models has spurred increased interest in the use of SPADs in commercial products.
In this talk, Bauer introduces SPAD-based imagers, explains how they work, presents their fundamental capabilities, and identifies their key strengths and weaknesses relative to conventional image sensors. He also shows how they can be used in a variety of applications.
Presented at the Intel Global IoT DevFest (Oct 2017)
- Real-world use cases: healthcare, building management, retail, smart cities, transportation
- Time-series analysis
- AI / ML overview & applications
For the full video of this presentation, please visit:
https://www.embedded-vision.com/platinum-members/embedded-vision-alliance/embedded-vision-training/videos/pages/may-2018-embedded-vision-summit-benosman
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Ryad B. Benosman, Professor at the University of Pittsburgh Medical Center, Carnegie Mellon University and Sorbonne Universitas, presents the "What is Neuromorphic Event-based Computer Vision? Sensors, Theory and Applications" tutorial at the May 2018 Embedded Vision Summit.
In this presentation, Benosman introduces neuromorphic, event-based approaches for image sensing and processing. State-of-the-art image sensors suffer from severe limitations imposed by their very principle of operation. These sensors acquire the visual information as a series of “snapshots” recorded at discrete point in time, hence time-quantized at a predetermined frame rate, resulting in limited temporal resolution, low dynamic range and a high degree of redundancy in the acquired data. Nature suggests a different approach: Biological vision systems are driven and controlled by events happening within the scene in view, and not – like conventional image sensors – by artificially created timing and control signals that have no relation to the source of the visual information.
Translating the frameless paradigm of biological vision to artificial imaging systems implies that control over the acquisition of visual information is no longer imposed externally on an array of pixels but rather the decision making is transferred to each individual pixel, which handles its own information individually. Benosman introduces the fundamentals underlying such bio-inspired, event-based image sensing and processing approaches, and explores their strengths and weaknesses. He shows that bio-inspired vision systems have the potential to outperform conventional, frame-based vision acquisition and processing systems and to establish new benchmarks in terms of data compression, dynamic range, temporal resolution and power efficiency in applications such as 3D vision, object tracking, motor control and visual feedback loops, in real-time.
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
Abstract: It is widely argued that today's largely reactive, "respond and patch" approach to securing cyber systems must yield to a new, more rigorous, more proactive methodology. Achieving this transformation is a difficult challenge. Building on insights into requirements for cyber science and on experience gained through 8 years of operation, the DETER project is addressing one facet of this problem: the development of transformative advances in methodology and facilities for experimental cybersecurity research and system evaluation. These advances in experiment design and research methodology are yielding progressive improvements not only in experiment scale, complexity, diversity, and repeatability, but also in the ability of researchers to leverage prior experimental efforts of others within the community. We describe in this paper the trajectory of the DETER project towards a new experimental science and a transformed facility for cyber-security research development and evaluation.
For more information, visit: http://www.deter-project.org
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
Abstract: Since 2004, the DETER Cybersecurity Testbed Project has worked to create the necessary infrastructure – facilities, tools, and processes – to provide a national resource for experimentation in cyber security. The next generation of DETER envisions several conceptual advances in testbed design and experimental research methodology, targeting improved experimental validity, enhanced usability, and increased size, complexity, and diversity of experiments. This paper outlines the DETER project's status and R&D directions.
For more information, visit: http://www.deter-project.org
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
Terry Benzel provided the keynote address at the 11th Annual Computer Security Applications Conference (ACSAC). This document is the invited paper that she addressed in her keynote.
Abstract: Since 2004, the DETER Cyber-security Project has worked to create an evolving infrastructure – facilities, tools, and processes – to provide a national resource for experimentation in cyber security. Building on our insights into requirements for cyber science and on lessons learned through 8 years of operation, we have made several transformative advances towards creating the next generation of DeterLab. These advances in experiment design and research methodology are yielding progressive improvements not only in experiment scale, complexity, diversity, and repeatability, but also in the ability of researchers to leverage prior experimental efforts of other researchers in the DeterLab user community. This paper describes the advances resulting in a new experimentation science and a transformed facility for cyber-security research development and evaluation.
Further described: http://www.deter-project.org/blog/deter_-_keynote_address_acsac_key_new_web_site
For additional information, visit:
- http://www.deter-project.org
- http://info.deterlab.net
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/10/an-introduction-to-single-photon-avalanche-diodes-a-new-type-of-imager-for-computer-vision-a-presentation-from-the-university-of-wisconsin-madison/
Sebastian Bauer, Postdoctoral Student at the University of Wisconsin – Madison, presents the “Introduction to Single-Photon Avalanche Diodes—A New Type of Imager for Computer Vision” tutorial at the May 2021 Embedded Vision Summit.
The single-photon avalanche diode (SPAD) is an emerging image sensing technology with unique capabilities relevant to computer vision applications. Originally designed for imaging in low-light conditions, the ultra-high time resolution of SPADs also helps to achieve extremely high dynamic range, motion blur-free images and even seeing around corners. The use of SPADs in recent iPhone models has spurred increased interest in the use of SPADs in commercial products.
In this talk, Bauer introduces SPAD-based imagers, explains how they work, presents their fundamental capabilities, and identifies their key strengths and weaknesses relative to conventional image sensors. He also shows how they can be used in a variety of applications.
Presented at the Intel Global IoT DevFest (Oct 2017)
- Real-world use cases: healthcare, building management, retail, smart cities, transportation
- Time-series analysis
- AI / ML overview & applications
For the full video of this presentation, please visit:
https://www.embedded-vision.com/platinum-members/embedded-vision-alliance/embedded-vision-training/videos/pages/may-2018-embedded-vision-summit-benosman
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Ryad B. Benosman, Professor at the University of Pittsburgh Medical Center, Carnegie Mellon University and Sorbonne Universitas, presents the "What is Neuromorphic Event-based Computer Vision? Sensors, Theory and Applications" tutorial at the May 2018 Embedded Vision Summit.
In this presentation, Benosman introduces neuromorphic, event-based approaches for image sensing and processing. State-of-the-art image sensors suffer from severe limitations imposed by their very principle of operation. These sensors acquire the visual information as a series of “snapshots” recorded at discrete point in time, hence time-quantized at a predetermined frame rate, resulting in limited temporal resolution, low dynamic range and a high degree of redundancy in the acquired data. Nature suggests a different approach: Biological vision systems are driven and controlled by events happening within the scene in view, and not – like conventional image sensors – by artificially created timing and control signals that have no relation to the source of the visual information.
Translating the frameless paradigm of biological vision to artificial imaging systems implies that control over the acquisition of visual information is no longer imposed externally on an array of pixels but rather the decision making is transferred to each individual pixel, which handles its own information individually. Benosman introduces the fundamentals underlying such bio-inspired, event-based image sensing and processing approaches, and explores their strengths and weaknesses. He shows that bio-inspired vision systems have the potential to outperform conventional, frame-based vision acquisition and processing systems and to establish new benchmarks in terms of data compression, dynamic range, temporal resolution and power efficiency in applications such as 3D vision, object tracking, motor control and visual feedback loops, in real-time.
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
Abstract: It is widely argued that today's largely reactive, "respond and patch" approach to securing cyber systems must yield to a new, more rigorous, more proactive methodology. Achieving this transformation is a difficult challenge. Building on insights into requirements for cyber science and on experience gained through 8 years of operation, the DETER project is addressing one facet of this problem: the development of transformative advances in methodology and facilities for experimental cybersecurity research and system evaluation. These advances in experiment design and research methodology are yielding progressive improvements not only in experiment scale, complexity, diversity, and repeatability, but also in the ability of researchers to leverage prior experimental efforts of others within the community. We describe in this paper the trajectory of the DETER project towards a new experimental science and a transformed facility for cyber-security research development and evaluation.
For more information, visit: http://www.deter-project.org
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
Abstract: Since 2004, the DETER Cybersecurity Testbed Project has worked to create the necessary infrastructure – facilities, tools, and processes – to provide a national resource for experimentation in cyber security. The next generation of DETER envisions several conceptual advances in testbed design and experimental research methodology, targeting improved experimental validity, enhanced usability, and increased size, complexity, and diversity of experiments. This paper outlines the DETER project's status and R&D directions.
For more information, visit: http://www.deter-project.org
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
Terry Benzel provided the keynote address at the 11th Annual Computer Security Applications Conference (ACSAC). This document is the invited paper that she addressed in her keynote.
Abstract: Since 2004, the DETER Cyber-security Project has worked to create an evolving infrastructure – facilities, tools, and processes – to provide a national resource for experimentation in cyber security. Building on our insights into requirements for cyber science and on lessons learned through 8 years of operation, we have made several transformative advances towards creating the next generation of DeterLab. These advances in experiment design and research methodology are yielding progressive improvements not only in experiment scale, complexity, diversity, and repeatability, but also in the ability of researchers to leverage prior experimental efforts of other researchers in the DeterLab user community. This paper describes the advances resulting in a new experimentation science and a transformed facility for cyber-security research development and evaluation.
Further described: http://www.deter-project.org/blog/deter_-_keynote_address_acsac_key_new_web_site
For additional information, visit:
- http://www.deter-project.org
- http://info.deterlab.net
One of the most important aspect of Wireless Sensor Networks is Monitoring the content of moisture in the soil, temperature and humidity with the help of Zigbee.
IOT based smart security and monitoring devices for agriculture sneha daise paulson
Agriculture sector being the backbone of the Indian economy deserves security. Security not in terms of resources only but also agricultural products needs security and protection at very initial stage, like protection from attacks of rodents or insects, in fields or grain stores. Such challenges should also be taken into consideration. Security systems which are being used now a days are not smart enough to provide real time notification after sensing the problem. The integration of traditional methodology with latest technology as Internet of Things can lead to agricultural modernization. Keeping this scenario in mind an ‘Internet of Things’ based device have been designed, tested and analyzed which is capable of analyzing the sensed information and then transmitting it to the user. This device can be controlled and monitored from remote location and it can be implemented in agricultural fields, grain stores and cold stores for security purpose. This paper is oriented to accentuate the methods to solve such problems like identification of rodents, threats to crops and delivering real time notification based on information analysis and processing without human intervention. In this device, mentioned sensors and electronic devices are integrated using Python scripts. Based on attempted test cases, we were able to achieve success in 84.8% test cases.
Today Home Automation is one of the growing requirement in the society. This paper presents the implementation of Home Automation using Raspberry Pi. The Raspberry Pi is a basic embedded system and being a low cost single-board computer used to reduce the complexity of systems in real time applications. This application mainly serves as an efficient base to control various home appliance like Fan, Tube light, Refrigerator through mobile based application. The application is designed to provide a facility to user to access control of many appliances used in homes.
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
You are likely benefitting from The Internet of Things (IoT) today, whether or not you’re familiar with the term. If your phone automatically connects to your car radio, or if you have a smartwatch counting your steps, congratulations! You have adopted one small piece of a very large IoT pie, even if you haven't adopted the name yet.
IoT may sound like a business buzzword, but in reality, it’s a real technological revolution that will impact everything we do. It's the next IT Tsunami of new possibility that is destined to change the face of technology, as we know it. IoT is the interconnectivity between things using wireless communication technology (each with their own unique identifiers) to connect objects, locations, animals, or people to the Internet, thus allowing for the direct transmission of and seamless sharing of data.
IoT represents a massive wave of technical innovation. Highly valuable companies will be built and new ecosystems will emerge from bridging the offline world with the online into one gigantic new network. Our limited understanding of the possibilities hinders our ability to see future applications for any new technology. Mainstream adoption of desktop computers and the Internet didn’t take hold until they became affordable and usable. When that occurred, fantastic and creative new innovation ensued. We are on the cusp of that tipping point with the Internet of Things.
IoT matters because it will create new industries, new companies, new jobs, and new economic growth. It will transform existing segments of our economy: retail, farming, industrial, logistics, cities, and the environment. It will turn your smartphone into the command center for the both digital and physical objects in your life. You will live and work smarter, not harder – and what we are seeing now is only the tip of the iceberg.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
One of the most important aspect of Wireless Sensor Networks is Monitoring the content of moisture in the soil, temperature and humidity with the help of Zigbee.
IOT based smart security and monitoring devices for agriculture sneha daise paulson
Agriculture sector being the backbone of the Indian economy deserves security. Security not in terms of resources only but also agricultural products needs security and protection at very initial stage, like protection from attacks of rodents or insects, in fields or grain stores. Such challenges should also be taken into consideration. Security systems which are being used now a days are not smart enough to provide real time notification after sensing the problem. The integration of traditional methodology with latest technology as Internet of Things can lead to agricultural modernization. Keeping this scenario in mind an ‘Internet of Things’ based device have been designed, tested and analyzed which is capable of analyzing the sensed information and then transmitting it to the user. This device can be controlled and monitored from remote location and it can be implemented in agricultural fields, grain stores and cold stores for security purpose. This paper is oriented to accentuate the methods to solve such problems like identification of rodents, threats to crops and delivering real time notification based on information analysis and processing without human intervention. In this device, mentioned sensors and electronic devices are integrated using Python scripts. Based on attempted test cases, we were able to achieve success in 84.8% test cases.
Today Home Automation is one of the growing requirement in the society. This paper presents the implementation of Home Automation using Raspberry Pi. The Raspberry Pi is a basic embedded system and being a low cost single-board computer used to reduce the complexity of systems in real time applications. This application mainly serves as an efficient base to control various home appliance like Fan, Tube light, Refrigerator through mobile based application. The application is designed to provide a facility to user to access control of many appliances used in homes.
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
You are likely benefitting from The Internet of Things (IoT) today, whether or not you’re familiar with the term. If your phone automatically connects to your car radio, or if you have a smartwatch counting your steps, congratulations! You have adopted one small piece of a very large IoT pie, even if you haven't adopted the name yet.
IoT may sound like a business buzzword, but in reality, it’s a real technological revolution that will impact everything we do. It's the next IT Tsunami of new possibility that is destined to change the face of technology, as we know it. IoT is the interconnectivity between things using wireless communication technology (each with their own unique identifiers) to connect objects, locations, animals, or people to the Internet, thus allowing for the direct transmission of and seamless sharing of data.
IoT represents a massive wave of technical innovation. Highly valuable companies will be built and new ecosystems will emerge from bridging the offline world with the online into one gigantic new network. Our limited understanding of the possibilities hinders our ability to see future applications for any new technology. Mainstream adoption of desktop computers and the Internet didn’t take hold until they became affordable and usable. When that occurred, fantastic and creative new innovation ensued. We are on the cusp of that tipping point with the Internet of Things.
IoT matters because it will create new industries, new companies, new jobs, and new economic growth. It will transform existing segments of our economy: retail, farming, industrial, logistics, cities, and the environment. It will turn your smartphone into the command center for the both digital and physical objects in your life. You will live and work smarter, not harder – and what we are seeing now is only the tip of the iceberg.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
DSD-INT 2019 Modelling in DANUBIUS-RI-BellafioreDeltares
Presentation by Debora Bellafiore (ISMAR, Italy), at the DANUBIUS Modelling Workshop, during Delft Software Days - Edition 2019. Friday, 8 November 2019, Delft.
A Study on MDE Approaches for Engineering Wireless Sensor Networks Ivano Malavolta
27th August 2014. My presentation at SEAA 2014 (http://esd.scienze.univr.it/dsd-seaa-2014) about our a study on model-driven engineering approaches for engineering Wireless Sensor Networks (WSNs).
Accompanying paper: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6928805
Abstract:
Model-Driven Engineering (MDE) can be considered as the right tool to reduce the complexity of Wireless Sensor Network (WSN) development through its principles of abstraction, separation of concerns, reuse and automation. In this paper we present the results of a systematic mapping study we performed for providing an organized view of existing MDE approaches for designing WSNs.
A total number of 780 studies were analysed; among them, we selected 16 papers as primary studies relevant for review. We setup a comparison framework for these studies, and classified them based on a set of common parameters. The main objective of our research is to give an overview about the state-of-the-art of MDE approaches dedicated to WSN design, and finally, discuss emerging challenges that have to be considered in future MDE approaches for engineering WSNs.
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...IJNSA Journal
In this paper, various existing simulation environments for general purpose and specific purpose WSNs are discussed. The features of number of different sensor network simulators and operating systems are compared. We have presented an overview of the most commonly used operating systems that can be used in different approaches to address the common problems of WSNs. For different simulation environments there are different layer, components and protocols implemented so that it is difficult to compare them. When same protocol is simulated using two different simulators still each protocol implementation differs, since their functionality is exactly not the same. Selection of simulator is purely based on the application, since each simulator has a varied range of performance depending on application.
Sensors Scheduling in Wireless Sensor Networks: An Assessmentijtsrd
The wireless sensor networks WSN is a combination of a large number of low power, short lived, unreliable sensors. The main challenge of wireless sensor network is to obtain long system lifetime. Many node scheduling algorithms are used to solve this problem. This method can be divided into the following two major categories first is round based node scheduling and second is group based node scheduling. In this paper many node scheduling algorithm like one phase decomposition model, Tree Based distributed wake up scheduling and Clique based node scheduling Algorithm are analyzed. Manju Ghorse | Dr. Avinash Sharma "Sensors Scheduling in Wireless Sensor Networks: An Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29560.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/29560/sensors-scheduling-in-wireless-sensor-networks-an-assessment/manju-ghorse
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
Simulation tools for wireless sensor networks are increasingly being used to study sensor webs and to test new applications and protocols in this evolving research field. There is always an overriding concern when using simulation that the results may not reflect accurate behavior. It is therefore essential to know the strengths and weaknesses of these simulators. This paper provides a comprehensive survey and comparisons of various popular sensor network simulators with a view to help researchers choose the best simulator available for a particular application environment. It also provides a detailed comparison describing the pros and cons of each simulator.
Nanotechnology is the manipulation of matter on a near-atomic scale to produce new structures, materials and devices. The technology promises scientific advancement in many sectors such as medicine, consumer products, energy, materials and manufacturing. Nanotechnology is generally defined as engineered structures, devices, and systems. Nanomaterials are defined as those things that have a length scale between 1 and 100 nanometers. At this size, materials begin to exhibit unique properties that affect physical, chemical, and biological behavior. Researching, developing, and utilizing these properties is at the heart of new technology.
Workers within nanotechnology-related industries have the potential to be exposed to uniquely engineered materials with novel sizes, shapes, and physical and chemical properties. Occupational health risks associated with manufacturing and using nanomaterials are not yet clearly understood. Minimal information is currently available on dominant exposure routes, potential exposure levels, and material toxicity of nanomaterials.
Studies have indicated that low solubility nanoparticles are more toxic than larger particles on a mass for mass basis. There are strong indications that particle surface area and surface chemistry are responsible for observed responses in cell cultures and animals. Studies suggests that some nanoparticles can move from the respiratory system to other organs. Research is continuing to understand how these unique properties may lead to specific health effects. Engineering controls are being studied to reduce worker exposures through comprehensive risk assessments. This presentation addresses the current research in identification of hazardous working conditions and the types of engineering controls that can be used to control and reduce the exposure to an acceptable risk.
Similar to A Survey on the Specification of the Physical Environment of Wireless Sensor Networks (20)
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...Ivano Malavolta
Slides of my invited talk at the 2nd workshop on Quality and Reliability Assessment of Robotic Software Architectures and Components (QRARSAC), co-located with the International Conference on Robotics and Automation (ICRA 2023).
Abstract of the talk. Today robotic systems are central to many industrial sectors, such as logistics, autonomous warehousing, and healthcare. If on one side ROS is helping roboticists by providing a standardized communication platform for robotic systems, on the other side ROSsystems are getting more and more large and complex, thus making it extremely difficult to ensure their level of quality, e.g., in terms of performance, security, energy efficiency, testability, maintainability. Improving the quality of robotic systems is not a new activity, but in this talk, we tackle it from a different perspective: we look at them from a software architecture perspective. In this talk, I will walk you through a series of experiments we conducted at the Vrije Universiteit Amsterdam targeting the architecture of ROS systems, we will discuss some architectural tactics for ROS systems, and will close with an overview of our open-source tool for automatically executing experiments on robotics software.
The slides of a short presentation I gave about my experience about working in the context of EU grants. It contains tips and tricks for the before/during/after phases of a EU project.
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)Ivano Malavolta
The slides of my presentation about the Green Lab at the event called Research Cocktail (October 2020). The event is organized by the Computer Science Department of the Vrije Universiteit Amsterdam.
The source code of our tools and the replication package of our experiments performed in the Green Lab can be found here: https://github.com/S2-group
For further details about the Green Lab and all our activities around it, you can contact me at i.malavolta@vu.nl
Navigation-aware and Personalized Prefetching of Network Requests in Android ...Ivano Malavolta
Slides of my presentation at the NIER track of the 41th International Conference on Software Engineering (ICSE 2019).
The paper is available here: http://www.ivanomalavolta.com/files/papers/ICSE_2019_NAPPA.pdf
How Maintainability Issues of Android Apps Evolve [ICSME 2018]Ivano Malavolta
Slides of my presentation at the Research track of the 34th International Conference on Software Maintenance and Evolution (ICSME 2018).
The full paper is available here: http://www.ivanomalavolta.com/files/papers/ICSME_2018.pdf
Collaborative Model-Driven Software Engineering: a Classification Framework a...Ivano Malavolta
Slides of my presentation at the Journal first track of the 40th International Conference on Software Engineering (ICSE 2018).
The accompanying extended abstract is available here: http://www.ivanomalavolta.com/files/papers/ICSE_2018_JournalFirst.pdf
The original TSE paper is available here: http://www.ivanomalavolta.com/files/papers/TSE_2017.pdf
This presentation is about a lecture I gave within the "Software Design" course of the Computer Science bachelor program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
Modeling behaviour via UML state machines [Software Design] [Computer Science...Ivano Malavolta
This presentation is about a lecture I gave within the "Software Design" course of the Computer Science bachelor program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Software Design" course of the Computer Science bachelor program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Software Design" course of the Computer Science bachelor program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...Ivano Malavolta
This presentation is about a lecture I gave within the "Software Design" course of the Computer Science bachelor program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
Modeling and abstraction, software development process [Software Design] [Com...Ivano Malavolta
This presentation is about a lecture I gave within the "Software Design" course of the Computer Science bachelor program, of the Vrije Universiteit Amsterdam.
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
[2017/2018] AADL - Architecture Analysis and Design LanguageIvano Malavolta
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
[2017/2018] Introduction to Software ArchitectureIvano Malavolta
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.it/.
http://www.ivanomalavolta.com
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. Wireless sensor networks (WSNs)
WSNs consist of spatially distributed sensors that cooperate to
accomplish some tasks.
Sensors are:
– small
– battery-powered
– with limited processing power
– with limited memory
They can be easily deployed to monitor different environmental
parameters such as temperature, movement, sound and pollution.
4. WSN applications
Sensors can be distributed on roads, vehicles, hospitals, buildings,
people and enable different applications such as:
• environmental monitoring
• medical services
• battlefield operations
• crisis response
• disaster relief
5. WSN physical environment (1)
What really sets WSNs apart from all the other kinds of distributed
systems is:
• limited processing capabilities of the nodes
• contingent energy restrictions
• strict dependence to physical phenomena
like refraction, reflection, and attenuation…
à The physical environment in which
WSN nodes are deployed strongly
affects the overall quality of the system
6. WSN physical environment (2)
Information from the physical environment, like:
• exact position of the nodes
• information about the surrounding obstacles and their material
– e.g., walls, furniture, windows, or small objects in general
surely helps making an accurate estimate of the physical phenomena
affecting the WSN
Such data could allow a more precise
measurement of the network in
terms of: bit error rate, packets loss,
energy consumption, etc.
à enables the prediction of how the
WSN will globally behave when
nodes are deployed in different ways
9. Contribution
To investigate on how practitioners specify the physical
environment of a WSN
Survey by interviewing WSN practitioners with a special
focus on their practical needs and activities
• Many practitioners describe the physical environment
via GIS software or informally
• practitioners not specifying the physical environment
do not see a clear return on investment on doing it or
perceive existing algorithms and tools as too complex
• practitioners rate as definitely useful a potential tool
for deploying WSN nodes on a virtual environment
GOAL
HOW
MAIN
FINDINGS
11. Research objective
Our main research question is
How WSN engineers currently define the physical
environment, and how they would like to do it?
Why they should define it? To better reason on:
• the network topology
• how much power is consumed by the application running on the nodes
with respect to the used batteries or harvested energy sources
• how well an area is covered or tracked by sensors
• …
12. Research sub-questions
Do engineers explicitly specify the physical environment
where the WSN is going to be deployed?
RQ1
If so, how do they accomplish this task (e.g., formally, informally, etc.)?
Do engineers specify the sensor nodes and their exact
position within the physical environment of a WSN?
RQ2
If so, how do they do it (do they consider obstacles, hardware configuration, etc.)?
What are the most relevant features a potential tool for
specifying the physical environment of a WSN shall expose?
RQ3
Need to consider the exact shape of obstacles, or only an approximation?
How would WSN engineers prefer to interact with such a potential tool?
13. Population selection (1)
Participant profile:
Engineer who has been concretely involved in the
development of at least one WSN in the last 10 years
Two sampling methods:
1. Convenience sampling - we directly selected WSN engineers from:
– our personal contacts
– reference websites, newsgroups, and other web resources about WSN
OSs, node vendors, and WSN technologies in general
14. Population selection (2)
2. snowball sampling [4] - we asked selected participants to nominate
additional experts in their network
Resulting population
21 WSN engineers from 18 different organizations in 9 countries
Main affiliation types:
– university
– center of excellence
– company
– research institution
image from: http://www.hsrmethods.org/Glossary/Terms/S/Snowball%20Sampling.aspx
15. Design of the questionnaire*
a.Introduction
b.Personal
information
Yes
Is the WSN
environment
specified?
c. Questions about the
WSN environment
specification
No
c. Questions
about why and
how the WSN
environment is
not specified
Is the WSN
environment
specified
digitally?
Yes
c. Questions about
digital WSN
environment
No
e. Questions about
the potential tool for
WSN environment
d. Questions about
WSN Design
f. Concluding
questions
Yes
Involved in the
WSN design
phase?
No
21
7
close-ended questions
open-ended questions
a) purpose of the study + terminology
b) demographical info of participants
c) how environment is specified
d) focus on nodes and positioning
e) potential tool for WSN environment
f) additional comments + snowballing
A transcript of the questionnare is available here: http://www.di.univaq.it/malavolta/wsn/WSNenv.pdf
17. Population
21 practitioners:
14 with experience ≥ 5 years
7 with experience < 5 years
1
1
14
2
3
1
1
15
3
1
0
2
4
6
8
10
12
14
16
1000 and above
100-999
50-99
10-49
1-9
Average number of WSN nodes
Number of nodes in the largest WSN project
53%
23%
19%
5%
#projects < 3
3 ≥ #projects ≤ 6
#projects > 6
No info
43%
28%
5%
24%
Equally indoor and outdoor
Mostly indoor
Mostly outdoor
Indoor only
18. WSN environment specification (1)
Encouraging for our study since
we can investigate on both types
of development processes
Major trend in specifying the
environment in a precise way,
rather than relying on draft
specifications.
48%
52%
The WSN environment is
explicitly specified
The WSN environment is
not specified
20%
30%30%
10%
10%
Always by a draft
Mostly by a precise
specification
Equally
Not specififed
Always by a precise
specification
19. WSN environment specification (2)
Clear trend in favor of digital
representation
Most used file formats:
text-based and images
Basically, those results uncover
the great variance about the
software used to represent the
WSN environment
90%
10%
Digital
representation
Paper-based
representation
40%
30%
20%
10%
Maps and GIS
software
Office software
Dedicated
software
Don't know
20. 2D vs 3D
80%
10%
10%
2D
3D
2d and 3D
Due to the complexity of producing
3D models?
Due to the fact that 2D models are
perceived to be sufficient for
representing the environment of a
WSN?
In this case, 2D+3D representation
is the main trend
In their last project
Best options in general?
20%
30%
50%
2D
3D
2d and 3D
21. Obstacles definition
33, 33%
13, 13%
33, 33%
6, 6%
15,
15%
Free space (no obstacles)
Walls, floor, and roof
Walls, floor, roof, windows, and
large-sized objects
Walls, floor, roof, windows,
large and small-sized objects
No choice
Clear winners:
• free-space environment
• only very large obstacles (e.g., walls, roofs, etc.)
22. Hardware and nodes positioning
94%
10%
Definetely useful
Not useful
Indeed, WSN engineers must have
at least some knowledge about the
hardware features of the nodes
used in the WSN.
Examples:
– transmission power of the antenna
– available sensing devices
– batteries voltage
Do analytical models and
simulation tools fit well
with practitioners’ needs?
Usefulness of having a hardware specification
Instrument for evaluating the optimal nodes positioning
84%
0%
16%
By deploying them on
site (real-world testbed)
Analytically
By simulating the
network
Other
“Simulation is performed only if
simple, feasible and meaningful,
otherwise deployment”
23. Why not specifying the WSN environment?
Why not?
54%
46%
No perceived
usefulness
Lack of satisfactory
tools, algorithms or
models
“Because up to now it has been
sufficient just to know the main
features of the environment”
“We mainly worked on networking
protocols, able to adapt to the changes
of the environment”
“Unclear whether the modeling
effort is going to pay off”
How do they proceed to the deployment of the WSN?
37%
27%
27%
9%
Not needed (adaptable
WSN)
Measure the WSN on the
field, after deployment
Preliminary measures of the
area and network simulation
Based on their experience
“It is simpler not to
model the environment
and compensate for
time dynamic failure
with robust algorithms”
24. Potential tool (1)
Proposal: potential tool that allows engineers to virtually deploy a WSN
in the environment.
Such a potential tool could simulate an environment where to virtually
deploy a set of defined sensor nodes into a digital version of its physical
environment.
48%
14%
38%
0%
Definetely useful
Useful
Neutral
Not very useful
Definitely not useful
25. Potential tool (2)
24%
33%
43%
Tool interaction
By importing a file produced by means of an external
tool (for example Autocad)
By directly drawing the environment within the tool
By firstly importing an image file to be used as a guide
to the drawing phase within the tool
When asked about their interest in defining the exact shape of the
obstacles, no clear trend has been identified
28. Do engineers explicitly specify the physical environment
where the WSN is going to be deployed?
RQ1
Good number of practitioners explicitly define the WSN environment
Almost equal number of practitioners do not
– mainly they do not see a clear ROI
– no satisfactory tool or method
à Researchers should
• provide a more concrete evidence about the advantages of
explicitly representing the WSN environment
• work further on methods, algorithms, and tools
Majority of participants would prefer to
– define the physical environment via mapping or GIS software
– use a combination of text and images
– use a combination of 2D and 3D representations
29. Do engineers specify the sensor nodes and their exact
position within the physical environment of a WSN?
RQ2
WSN practitioners typically:
– consider free-space environment
– consider only very large obstacles (e.g., walls, roofs, etc.)
– rely on physically measured testbeds
à do current simulation and analysis techniques demand too much
effort to WSN practitioners?
“Usually the available simulation tools do not provide a functionality to define
and describe the environment. However, I feel that it is equally important to
describe the environment and its behaviour in addition to the models that
define how the networking part will function. I believe this is due to the
difficulties in defining accurate models for the environment.”
30. What are the most relevant features a potential tool for
specifying the physical environment of a WSN shall expose?
RQ3
WSN practitioners strongly need a tool for:
1. defining the physical environment of a WSN
2. virtually deploying WSN nodes into it
The tool may allow engineers to specify the environment in different ways.
For example, by importing an image that will serve as the basis for a
subsequent drawing phase.
We believe that this option provides a good trade-off in terms of level of
usability and preciseness
Mininal set of physical effects to be considered: attenuation and reflection
32. Conclusions
“I think that a study on modelling and analysis of the WSN
environment is interesting and can give you some new ideas
because nowadays in most cases a WSN is intended as a set of
hardware nodes, without taking into account the place where the
nodes will be deployed”
33. References
[1] Y. Ben Maissa, F. Kordon, S. Mouline, and Y. Thierry-Mieg, “Modeling and analyzing
wireless sensor networks with verisensor: An integrated workflow,” in Transactions on
Petri Nets and Other Models of Concurrency VIII, ser. Lecture Notes in Computer
Science, M. Koutny, W. Aalst, and A. Yakovlev, Eds. Springer Berlin Heidelberg, 2013, vol.
8100, pp. 24–47. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-40465-8 2
[2] L. Samper, F. Maraninchi, L. Mounier, and L. Mandel, “Glonemo: Global and accurate
formal models for the analysis of ad-hoc sensor networks,” in Proceedings of the First
International Conference on Integrated Internet Ad Hoc and Sensor Networks, ser.
InterSense ’06. New York, NY, USA: ACM, 2006. [Online]. Available: http://doi.acm.org/
10.1145/1142680.1142684
[3] http://www.remcom.com/wireless-insite
[4] B. Kitchenham and S. L. Pfleeger, “Principles of survey research: part 5: populations
and samples,” SIGSOFT Softw. Eng. Notes, vol. 27, pp. 17–20, September 2002.
34. Ivano Malavolta |
Gran Sasso Science Institute
+ 39 380 70 21 600
iivanoo
ivano.malavolta@gssi.infn.it
www.ivanomalavolta.com
Contact