Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica - Tesi di Dottorato: Recent submissions
Items 21-40 di 203
-
Gene expression as a digital communication system
(2018-02-02)This PhD thesis extends upon the information theories of digital communication systems to analyse biological communications (nanocommunications) in order to accurately model biological communication as digital communication ... -
Bio-inspired techniques applied to the coordination of a swarm of robots involved in multiple tasks
(2017-11-13)La tematica di ricerca trattata in questa tesi riguarda il problema di coordinamento di robot attraverso l’utilizzo di algoritmi decentralizzati che usano meccanismi basati sulla Swarm Intelligence. Tali tecniche hanno ... -
Design of point contact solar cell by means of 3D numerical simulations
(Università della Calabria -Dottorato di Ricerca in Information and Communication Engineering For Pervasive Intelligent Environments, 2017-11-13)Nikola Tesla said that "the sun maintains all human life and supplies all human energy". As a matter of fact, sun furnishes with energy all forms of living, e.g., starting from the photosynthesis process, plants absorb ... -
Efficient incremental algorithms for handling graph data
(2017-11-13) -
Data mining techniques for large and complex data
(2017-11-13)During these three years of research I dedicated myself to the study and design of data mining techniques for large quantities of data. Particular attention was devoted to training set condensing techniques for the ... -
Design of back contact solar cells featuring metallization schemes with multiple emitter contact lines based on TCAD numerical simulations
(2017-11-13)The most hard-working goal within PV community is to design and manufacture devices featuring high-efficiency at low-cost with the better reliability as possible. The key to achieving this target is to optimize and improve ... -
Ensemble learning techniques for cyber security applications
(2017-07-13)Cyber security involves protecting information and systems from major cyber threats; frequently, some high-level techniques, such as for instance data mining techniques, are be used to efficiently fight, alleviate the ... -
mm-Wave Antennas For Satellite And Mobile Communications
(2017-07-26)Ever growing demands for higher data rate and bandwidth are pushing wireless applications to millimetre-wave band (3-300GHz), where sufficient bandwidth is available and high performance can be achieved without using complex ... -
Requirements engineering for complex systems
(2017-07-26)Requirements Engineering (RE) is a part of Software Engineering and, in general, of System Engineering. RE aims to help in building software which satis es the user needs, eliciting, documenting, validating and maintaining ... -
Distribution, Reuse and Interoperability of simulation models in heterogeneous distributed computing environments
(2017-07-26)Modeling and Simulation (M&S) is gaining a central role in several industrial domains such as automotive, e-science and aerospace, due to the increasing complexity of system requirements and thus of the related engineering ... -
<<A>> methodology for the development of autonomic and cognitive internet of things ecosystems
(2018-06-08)Advancements on microelectromechanical systems, embedded technologies, and wireless communications have recently enabled the evolution of conven- tional everyday things in enhanced entities, commonly de ned Smart ... -
Malevolent Activities Detection and Cyber Range Scenarios Orchestration
(2018-06-08)increasing availability of Internet accessible services driven by the di usion of connected devices. The consequent exposition to cyber-threats demands for suitable methodologies, techniques and tools allowing to adequately ... -
Global Optimization, Ordinary Differential Equations and Infinity Computing
(2018-06-08)La tesi consiste in 4 capitoli. I primi due capitoli riguardano l’ottimizzazione globale utilizzando il framework dei computer tradizionali, mentre gli altri due capitoli riguardano l’utilizzo della nuova tipologia dei ... -
Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing
(2018-08-06)Commodity operating systems, both on desktop and mobile devices, offer rich functionality and consequently a significant attack surface. A compromise of the operating system, however, means that an attacker also has access ...