Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica - Tesi di Dottorato

Permanent URI for this collectionhttps://lisa.unical.it/handle/10955/31

Questa collezione raccoglie le Tesi di Dottorato afferenti al Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica dell'Università della Calabria.

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    Technologies and IoT Protocols applied to Energy Management in Smart Home Environment
    (Università della Calabria, 2021-09-13) Serianni, Abdon; De Ranco, Floriano
    This thesis presents the studies during this period of my PhD course. In the first research period, I focused the activities principally on the study and analysis of the protocols and technologies used for the IoT solutions in Smart Home environment. It was analyzed the MQTT protocol and its possible applications. The MQTT protocol uses the event-driven publish/subscribe pattern. In our tests, MQTT usage was compared with a classic HTTP request/response paradigm, used in REST and CoAP approaches. A layered IoT communication architecture will be proposed and described. The usage of proposed IoT communication architecture was analyzed in Smart Home context and in other application contexts such as e-Health and Internet of Vehicles (IoV). After an analysis of Data Mining and Machine learning concepts, the focus of the activities was on Neural Networks. The use of LSTM networks was analyzed for time-series forecasting and prediction of consumption in two different environments (home and office). In the smart home environment, smart objects are characterized by limited resources. Our proposal to increase the computational capabilities of these smart devices is a hidden cognitive object that uses pre-trained NN and continuous learning for anomaly detection and suggested action prediction tasks. The Cognitive Smart Object is the joining of a smart device and a hidden cognitive object. The Cognitive Smart Object was used in thermal comfort control application and manage better energy consumption. The concepts introduced have been used for an assisted comfort solution and the neural network results were used to suggest to the user conventional management of the climatic comfort levels. A Continuous Learning mechanism was been implemented with the usage of user feedback to shape the neural network and obtain a neural network that follows user behaviours that diverge from behaviour compliant with the ASHRAE standard. From the analysis of the results obtained, it was possible to highlight how NN has given results closer to the user’s habits and at the same time the user has been educated to use the right levels of thermal comfort.
  • Thumbnail Image
    Item
    Ensemble learning techniques for cyber security applications
    (2017-07-13) Pisani, Francesco Sergio; Crupi, Felice; Folino, Gianluigi
    Cyber security involves protecting information and systems from major cyber threats; frequently, some high-level techniques, such as for instance data mining techniques, are be used to efficiently fight, alleviate the effect or to prevent the action of the cybercriminals. In particular, classification can be efficiently used for many cyber security application, i.e. in intrusion detection systems, in the analysis of the user behavior, risk and attack analysis, etc. However, the complexity and the diversity of modern systems opened a wide range of new issues difficult to address. In fact, security softwares have to deal with missing data, privacy limitation and heterogeneous sources. Therefore, it would be really unlikely a single classification algorithm will perform well for all the types of data, especially in presence of changes and with constraints of real time and scalability. To this aim, this thesis proposes a framework based on the ensemble paradigm to cope with these problems. Ensemble is a learning paradigm where multiple learners are trained for the same task by a learning algorithm, and the predictions of the learners are combined for dealing with new unseen instances. The ensemble method helps to reduce the variance of the error, the bias, and the dependence from a single dataset; furthermore, it can be build in an incremental way and it is apt to distributed implementations. It is also particularly suitable for distributed intrusion detection, because it permits to build a network profile by combining different classifiers that together provide complementary information. However, the phase of building of the ensemble could be computationally expensive as when new data arrives, it is necessary to restart the training phase. For this reason, the framework is based on Genetic Programming to evolve a function for combining the classifiers composing the ensemble, having some attractive characteristics. First, the models composing the ensemble can be trained only on a portion of the training set, and then they can be combined and used without any extra phase of training. Moreover the models can be specialized for a single class and they can be designed to handle the difficult problems of unbalanced classes and missing data. In case of changes in the data, the function can be recomputed in an incrementally way, with a moderate computational effort and, in a streaming environment, drift strategies can be used to update the models. In addition, all the phases of the algorithm are distributed and can exploits the advantages of running on parallel/ distributed architectures to cope with real time constraints. The framework is oriented and specialized towards cyber security applications. For this reason, the algorithm is designed to work with missing data, unbalanced classes, models specialized on some tasks and model working with streaming data. Two typical scenarios in the cyber security domain are provided and some experiment are conducted on artificial and real datasets to test the effectiveness of the approach. The first scenario deals with user behavior. The actions taken by users could lead to data breaches and the damages could have a very high cost. The second scenario deals with intrusion detection system. In this research area, the ensemble paradigm is a very new technique and the researcher must completely understand the advantages of this solution.
  • Thumbnail Image
    Item
    User behavioral problems in complex social networks
    (2019-06-20) Perna, Diego; Tagarelli, Andrea; Crupi, Felice
    Over the past two decades, we witnessed the advent and the rapid growth of numerous social networking platforms. Their pervasive diffusion dramatically changed the way we communicate and socialize with each other. They introduce new paradigms and impose new constraints within their scope. On the other hand, online social networks (OSNs) provide scientists an unprecedented opportunity to observe, in a controlled way, human behaviors. The goal of the research project described in this thesis is to design and develop tools in the context of network science and machine learning, to analyze, characterize and ultimately describe user behaviors in OSNs. After a brief review of network-science centrality measures and ranking algorithms, we examine the role of trust in OSNs, by proposing a new inference method for controversial situations. Afterward, we delve into social boundary spanning theory and define a ranking algorithm to rank and consequently identify users characterized by alternate behavior across OSNs. The second part of this thesis deals with machine-learning-based approaches to solve problems of learning a ranking function to identify lurkers and bots in OSNs. In the last part of this thesis, we discuss methods and techniques on how to learn a new representational space of entities in a multilayer social network.