43 results on '"Alberto Tonda"'
Search Results
2. Multi-objective Evolutionary Discretization of Gene Expression Profiles: Application to COVID-19 Severity Prediction
- Author
-
David Rojas-Velazquez, Alberto Tonda, Itzel Rodriguez-Guerra, Aletta D. Kraneveld, and Alejandro Lopez-Rincon
- Published
- 2023
3. An intercontinental machine learning analysis of factors explaining consumer awareness of food risk
- Author
-
Alberto Tonda, Christian Reynolds, and Rallou Thomopoulos
- Subjects
Food Science - Published
- 2023
4. SARS-CoV-2 Omicron Variant AI-based Primers
- Author
-
Carmina A. Perez-Romero, Alberto Tonda, Lucero Mendoza-Maldonado, John MacSharry, Joanna Szafran, Eric Claassen, Johan Garssen, Aletta D. Kraneveld, and Alejandro Lopez-Rincon
- Abstract
As the COVID-19 pandemic continues to affect the world, a new variant of concern, B.1.1.529 (Omicron), has been recently identified by the World Health Organization. At the time of writing, there are still no available primer sets specific to the Omicron variant, and its identification is only possible by using multiple targets, checking for specific failures, amplifying the suspect samples, and sequencing the results. This procedure is considerably time-consuming, in a situation where time might be of the essence. In this paper we use an Artificial Intelligence (AI) technique to identify a candidate primer set for the Omicron variant. The technique, based on Evolutionary Algorithms (EAs), has been already exploited in the recent past to develop primers for the B.1.1.7/Alpha variant, that have later been successfully tested in the lab. Starting from available virus samples, the technique explores the space of all possible subsequences of viral RNA, evaluating them as candidate primers. The criteria used to establish the suitability of a sequence as primer includes its frequency of appearance in samples labeled as Omicron, its absence from samples labeled as other variants, a specific range of melting temperature, and its CG content. The resulting primer set has been validated in silico and proves successful in preliminary laboratory tests. Thus, these results prove further that our technique could be established as a working template for a quick response to the appearance of new SARS-CoV-2 variants.
- Published
- 2022
5. Machine learning for agri-food processes: learning from data, human knowledge, and interactions
- Author
-
Nathalie Mejean Perrot, Alberto Tonda, Nadia Boukhelifa, Ilaria Brunetti, Anastasia Bezerianos, and Evelyne Lutton
- Published
- 2022
6. List of contributors
- Author
-
João Antunes, Suman Bajracharya, Rengesh Balakrishnan, Lina Fernanda Ballesteros, Anastasia Bezerianos, Lionel Boillereaux, Nadia Boukhelifa, Konstantina Boura, Ilaria Brunetti, Filipa Castro, Paul Christakopoulos, Jorge Alberto Vieira Costa, Rafael S. Costa, Camila Gonzales Cruz, Sébastien Curet, Nuno Ribeiro da Silva, Júlio César de Carvalho, Rafaela de Oliveira Penha, Paulo Cesar de Souza Kirnev, Santhosh Kumar Devarai, Agapi Dima, Huma Fatima, Carina L. Gargalo, Krist V. Gernaey, Nikky Goel, Sathyanarayana N. Gummadi, Aliyeh Hasanzadeh, Maria Kanellaki, Andreas Kartakoullis, Sunil Kumar Khare, Athanasios Koutinas, Adolf Krige, Pau Cabaneros Lopez, Evelyne Lutton, Antonio Irineudo Magalhães Junior, Amir Mahboubi, Venkatesh Mandari, Sriramani Mangipudi, Walter José Martínez-Burgos, Leonidas Matsakas, Mariano Michelon, Naresh Mohan, Michele Greque de Morais, Juliana Botelho Moreira, Ariane Fátima Murawski de Mello, Rui Oliveira, Nathalie Mejean Perrot, José Pinto, Luciana Porto de Souza Vandenberghe, Jeyaprakash Rajendhran, João Ramos, Panneerselvam Ranganathan, Olivier Rouaud, Neda Rousta, Ulrika Rova, Taner Sar, Omprakash Sarkar, Manoj Kumar Shanmugam, Sara Cruz Silvério, Rajeshwari Sinha, Senthilkumar Sivaprakasam, Carlos Ricardo Soccol, Mohammad J. Taherzadeh, José António Teixeira, Alberto Tonda, Isuru A. Udugama, Dekketi G.C. Vikram Reddy, Ioannis Vyrides, Leonardo Wedderhoff Herrmann, and Mark R. Wilkins
- Published
- 2022
7. Predictable Features Elimination: An Unsupervised Approach to Feature Selection
- Author
-
Pietro Barbiero, Giovanni Squillero, and Alberto Tonda
- Subjects
Machine Learning, Computational Intelligence, Feature Selection ,Machine Learning ,Computational Intelligence ,Feature Selection - Published
- 2022
8. Looking for archetypes: Applying game data mining to hearthstone decks
- Author
-
Antonio M. Mora, Alberto Tonda, Antonio J. Fernández-Ares, and Pablo García-Sánchez
- Subjects
Video games ,Human-Computer Interaction ,Artificial intelligence ,Collectible Card Games ,Game Data Mining ,Clustering Techniques ,Hearthstone ,Archetypes ,Inteligencia artificial ,Software ,Data visualisation - Abstract
Digital Collectible Cards Games such as Hearthstone have become a very proli c test-bed for Arti cial Intelligence algorithms. The main researches have focused on the implementation of autonomous agents (bots) able to effectively play the game. However, this environment is also very attractive for the use of Data Mining (DM) and Machine Learning (ML) techniques, for analysing and extracting useful knowledge from game data. The objective of this work is to apply existing Game Mining techniques in order to study more than 600,000 real decks (groups of cards) created by players with many di erent skill levels. Data visualisation and analysis tools have been applied, namely, Graph representations and Clustering techniques. Then, an expert player has conducted a deep analysis of the results yielded by these methods, aiming to identify the use of standard - and well-known - archetypes de ned by the players. The used methods will also make it possible for the expert to discover hidden relationships between cards that could lead to nding better combinations of them, enhancing players' decks or, otherwise, identify unbalanced cards that could lead to a disappointing game experience. Moreover, although this work is mostly focused on data analysis and visualization, the obtained results can be applied to improve Hearthstone Bots' behaviour, e.g. predicting opponent's actions after identifying a speci c archetype in his/her deck., Spanish Government PID2020-113462RB-I00 PID2020-115570 GB-C22, Junta de Andalucia B-TIC-402-UGR18 P18-RT-4830 A-TIC-608-UGR20
- Published
- 2022
9. Exploiting Artificial Swarms for the Virtual Measurement of Backlash in Industrial Robots
- Author
-
Eliana Giovannitti, Giovanni Squillero, Alberto Tonda, and Sayyidshahab Nabavi
- Subjects
Ideal (set theory) ,Exploit ,Computer science ,robotic manipulator ,backlash ,swarm-based approaches ,Swarm behaviour ,Measure (mathematics) ,Vibration ,Range (mathematics) ,Computer engineering ,Robot ,Backlash - Abstract
The backlash is a lost motion in a mechanism created by gaps between its parts. It causes vibrations that increase over time and negatively affect accuracy and performance. The quickest and most precise way to measure the backlash is to use specific sensors, that have to be added to the standard equipment of the robot. However, this solution is little used in practice because raises the manufacturing costs. An alternative solution can be to exploit a virtual sensor, i.e., the information about phenomena that are not directly measured is reconstructed by signals from sensors used for other measurements.This work evaluates the use of bio-inspired swarm algorithms as the processing core of a virtual sensor for the backlash of a robotic joint. Swarm-based approaches, with their relatively modest occupation of memory and low computational load, could be ideal candidates to solve the problem. In this paper, we exploit four state-of-the-art swarm-based optimization algorithms: the Dragonfly Algorithm, the Ant Lion Optimizer, the Grasshopper Optimization Algorithm, and the Grey Wolf Optimizer. The four candidate algorithms are compared on 20 different datasets covering a range of backlash values that reflect an industrial case scenario. Numerical results indicate that, unfortunately, none of the algorithms considered provides satisfactory solutions for the problem analyzed. Therefore, even if promising, these algorithms cannot represent the final choice for the problem of interest.
- Published
- 2021
10. Design of Specific Primer Sets for the Detection of SARS-CoV-2 Variants of Concern B.1.1.7, B.1.351, P.1, B.1.617.2 using Artificial Intelligence
- Author
-
Aletta D. Kraneveld, Jessica Vanhomwegen, Alejandro Lopez-Rincon, Carmina A. Perez-Romero, Johan Garssen, Eric Claassen, Alberto Tonda, Etienne Coz, Lucero Mendoza-Maldonado, and Patrick Tabeling
- Subjects
Lineage (genetic) ,Coronavirus disease 2019 (COVID-19) ,Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) ,Specific primers ,Computational biology ,New variant ,Biology ,Primer (molecular biology) ,Clade ,World health - Abstract
As the COVID-19 pandemic continues, new SARS-CoV-2 variants with potentially dangerous features have been identified by the scientific community. Variant B.1.1.7 lineage clade GR from Global Initiative on Sharing All Influenza Data (GISAID) was first detected in the UK, and it appears to possess an increased transmissibility. At the same time, South African authorities reported variant B.1.351, that shares several mutations with B.1.1.7, and might also present high transmissibility. Earlier this year, a variant labelled P.1 with 17 non-synonymous mutations was detected in Brazil. Recently the World Health Organization has raised concern for the variants B.1.617.2 mainly detected in India but now exported worldwide. It is paramount to rapidly develop specific molecular tests to uniquely identify new variants. Using a completely automated pipeline built around deep learning and evolutionary algorithms techniques, we designed primer sets specific to variants B.1.1.7, B.1.351, P.1 and respectively. Starting from sequences openly available in the GISAID repository, our pipeline was able to deliver the primer sets for each variant. In-silico tests show that the sequences in the primer sets present high accuracy and are based on 2 mutations or more. In addition, we present an analysis of key mutations for SARS-CoV-2 variants. Finally, we tested the designed primers for B.1.1.7 using RT-PCR. The presented methodology can be exploited to swiftly obtain primer sets for each new variant, that can later be a part of a multiplexed approach for the initial diagnosis of COVID-19 patients.
- Published
- 2021
11. Design of Specific Primer Set for Detection of B.1.1.7 SARS-CoV-2 Variant using Deep Learning
- Author
-
Johan Garssen, Aletta D. Kraneveld, Alejandro Lopez-Rincon, Lucero Mendoza-Maldonado, Carmina A. Perez-Romero, Alberto Tonda, and Eric Claassen
- Subjects
Silent mutation ,Set (abstract data type) ,Lineage (genetic) ,Genomics ,Computational biology ,Biology ,Primer (molecular biology) ,Clade ,Gene ,Virus - Abstract
The SARS-CoV-2 variant B.1.1.7 lineage, also known as clade GR from Global Initiative on Sharing All Influenza Data (GISAID), Nextstrain clade 20B, or Variant Under Investigation in December 2020 (VUI – 202012/01), appears to have an increased transmissability in comparison to other variants. Thus, to contain and study this variant of the SARS-CoV-2 virus, it is necessary to develop a specific molecular test to uniquely identify it. Using a completely automated pipeline involving deep learning techniques, we designed a primer set which is specific to SARS-CoV-2 variant B.1.1.7 with >99% accuracy, starting from 8,923 sequences from GISAID. The resulting primer set is in the region of the synonymous mutation C16176T in the ORF1ab gene, using the canonical sequence of the variant B.1.1.7 as a reference. Furtherin-silicotesting shows that the primer set’s sequences do not appear in different viruses, using 20,571 virus samples from the National Center for Biotechnology Information (NCBI), nor in other coronaviruses, using 487 samples from National Genomics Data Center (NGDC). In conclusion, the presented primer set can be exploited as part of a multiplexed approach in the initial diagnosis of Covid-19 patients, or used as a second step of diagnosis in cases already positive to Covid-19, to identify individuals carrying the B.1.1.7 variant.
- Published
- 2020
12. Modelling Processes and Products in the Cereal Chain
- Author
-
Serafim Bakalis, Maria N. Charalambides, Aberham Hailu Feyissa, Jose Benedito, Cristina Castañé, Nickolas G. Kavallieratos, Pasquale Trematerra, Alexandros Koulouris, Isabel Sousa, Milica Pojić, Jordi Riudavets, Anabela Raymundo, Fabrizio Sarghini, Christos G. Athanassiou, Alberto Tonda, Ferruh Erdogdu, Ilija Djekic, Aurelien Briffaz, Otilia Carvalho, Guy Della Valle, Carvalho, Otilia, Charalambides, Maria N, Djekić, Ilija, Athanassiou, Christo, Bakalis, Serafim, Benedito, Jose, Briffaz, Aurelien, Castañé, Cristina, Della Valle, Guy, de Sousa, Isabel Maria Nune, Erdogdu, Ferruh, Feyissa, Aberham Hailu, Kavallieratos, Nickolas G, Koulouris, Alexandro, Pojić, Milica, Raymundo, Anabela, Riudavets, Jordi, Sarghini, Fabrizio, Trematerra, Pasquale, Tonda, Alberto, Producció Vegetal, Protecció Vegetal Sostenible, Université de Lisbonne, Imperial College London, University of Belgrade [Belgrade], University of Thessaly [Volos] (UTH), University of Copenhagen = Københavns Universitet (UCPH), Universitat Politècnica de València (UPV), Démarche intégrée pour l'obtention d'aliments de qualité (UMR QualiSud), Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut de Recherche pour le Développement (IRD)-Avignon Université (AU)-Université de La Réunion (UR)-Université de Montpellier (UM)-Institut Agro - Montpellier SupAgro, Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro), Institut de Recerca i Tecnologia Agroalimentàries = Institute of Agrifood Research and Technology (IRTA), Unité de recherche sur les Biopolymères, Interactions Assemblages (BIA), Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), Ankara Üniversitesi, Danmarks Tekniske Universitet = Technical University of Denmark (DTU), Agricultural University of Athens, International Hellenic University, University of Novi Sad, University of Naples Federico II = Università degli studi di Napoli Federico II, Università degli Studi del Molise = University of Molise (UNIMOL), Mathématiques et Informatique Appliquées (MIA Paris-Saclay), AgroParisTech-Université Paris-Saclay-Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), European Cooperation in Science and Technology (COST) : CA15118., University of Copenhagen = Københavns Universitet (KU), Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-Institut de Recherche pour le Développement (IRD)-Avignon Université (AU)-Université de La Réunion (UR)-Université de Montpellier (UM)-Institut national d’études supérieures agronomiques de Montpellier (Montpellier SupAgro), Institute of Agrifood Research and Technology (IRTA), Technical University of Denmark [Lyngby] (DTU), University of Naples Federico II, University of Molise [Campobasso] (UNIMOL), University of Molise, Mathématiques et Informatique Appliquées (MIA-Paris), and Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE)-AgroParisTech-Université Paris-Saclay
- Subjects
0106 biological sciences ,cereals ,food transformation ,modelling ,transformation processes ,Health (social science) ,cereal ,TECNOLOGIA DE ALIMENTOS ,Computer science ,Supply chain ,Plant Science ,Review ,lcsh:Chemical technology ,01 natural sciences ,Health Professions (miscellaneous) ,Microbiology ,Field (computer science) ,Domain (software engineering) ,0404 agricultural biotechnology ,010608 biotechnology ,[SDV.IDA]Life Sciences [q-bio]/Food engineering ,lcsh:TP1-1185 ,2. Zero hunger ,Consumption (economics) ,Science & Technology ,business.industry ,04 agricultural and veterinary sciences ,[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation ,040401 food science ,Risk analysis (engineering) ,Agriculture ,Greenhouse gas ,Food Science & Technology ,Food processing ,business ,Transformation processes ,Life Sciences & Biomedicine ,0908 Food Sciences ,Food Science - Abstract
[EN] In recent years, modelling techniques have become more frequently adopted in the field of food processing, especially for cereal-based products, which are among the most consumed foods in the world. Predictive models and simulations make it possible to explore new approaches and optimize proceedings, potentially helping companies reduce costs and limit carbon emissions. Nevertheless, as the different phases of the food processing chain are highly specialized, advances in modelling are often unknown outside of a single domain, and models rarely take into account more than one step. This paper introduces the first high-level overview of modelling techniques employed in different parts of the cereal supply chain, from farming to storage, from drying to milling, from processing to consumption. This review, issued from a networking project including researchers from over 30 different countries, aims at presenting the current state of the art in each domain, showing common trends and synergies, to finally suggest promising future venues for research., The authors would like to acknowledge networking and article processing charge support by COST Action CA15118 (Mathematical and Computer Science Methods for Food Science and Industry).
- Published
- 2020
13. Evolutionary algorithms and machine learning
- Author
-
Alberto Tonda and Giovanni Squillero
- Subjects
Computer science ,business.industry ,Evolutionary algorithm ,0102 computer and information sciences ,02 engineering and technology ,Machine learning ,computer.software_genre ,01 natural sciences ,Evolutionary computation ,Machine Learning ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Machine Learning, Evolutionary Computation ,Evolutionary Computation ,business ,computer - Published
- 2020
14. Specific Primer Design for Accurate Detection of SARS-CoV-2 Using Deep Learning
- Author
-
Alejandro Lopez-Rincon, Alberto Tonda, Lucero Mendoza-Maldonado, Daphne G.J.C. Mulders, Richard Molenkamp, Eric Claassen, Johan Garssen, and Aletta D. Kraneveld
- Published
- 2020
15. A Missense Mutation in SARS-CoV-2 Potentially Differentiates Between Asymptomatic and Symptomatic Cases
- Author
-
Alejandro Lopez-Rincon, Alberto Tonda, Lucero Mendoza-Maldonado, Eric Claassen, Johan Garssen, and Aletta D. Kraneveld
- Published
- 2020
16. Making Sense of Economics Datasets with Evolutionary Coresets
- Author
-
Pietro Barbiero and Alberto Tonda
- Subjects
Training set ,Computer science ,business.industry ,Line (geometry) ,Evolutionary algorithm ,Artificial intelligence ,Machine learning ,computer.software_genre ,Coreset ,business ,computer - Abstract
Machine learning agents learn to take decisions extracting information from training data. When similar inferences can be obtained using a small subset of the same training set of samples, the subset is called coreset. Coresets discovery is an active line of research as it may be used to reduce the training speed as well as to allow human experts to gain a better understanding of both the phenomenon and the decisions, by reducing the number of samples to be examined. For classification problems, the state-of-the-art in coreset discovery is EvoCore, a multi-objective evolutionary algorithm. In this work EvoCore is exploited both on synthetic and on real data sets, showing how coresets may be useful in explaining decisions taken by machine learning classifiers.
- Published
- 2020
17. Virtual Measurement of the Backlash Gap in Industrial Manipulators
- Author
-
Eliana Giovannitti, Giovanni Squillero, Alberto Tonda, DAUIN Dipartimento di Automatica e Informatica, Politecnico di Torino [Torino] (Polito), Génie et Microbiologie des Procédés Alimentaires (GMPA), Institut National de la Recherche Agronomique (INRA)-AgroParisTech, Politecnico di Torino = Polytechnic of Turin (Polito), and AgroParisTech-Institut National de la Recherche Agronomique (INRA)
- Subjects
Rotary encoder ,0209 industrial biotechnology ,Schedule ,Evolutionary Computation ,Backlash ,Robotic joint transmission ,Shaft variable stiffness ,Computer science ,Evolutionary algorithm ,02 engineering and technology ,Evolutionary computation ,[SPI.AUTO]Engineering Sciences [physics]/Automatic ,020901 industrial engineering & automation ,[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG] ,Transmission (telecommunications) ,Control theory ,0202 electrical engineering, electronic engineering, information engineering ,Robot ,020201 artificial intelligence & image processing ,Closed loop ,ComputingMilieux_MISCELLANEOUS - Abstract
Industrial manipulators are robots used to replace humans in dangerous or repetitive tasks. Also, these devices are often used for applications where high precision and accuracy is required. The increase of backlash caused by wear, that is, the increase of the amount by which teeth space exceeds the thickness of gear teeth, might be a significant problem, that could lead to impaired performances or even abrupt failures. However, maintenance is difficult to schedule because backlash cannot be directly measured and its effects only appear in closed loops. This paper proposes a novel technique, based on an Evolutionary Algorithm, to estimate the increase of backlash in a robot joint transmission. The peculiarity of this method is that it only requires measurements from the motor encoder. Experimental evaluation on a real-world test case demonstrates the effectiveness of the approach.
- Published
- 2020
18. An evolutionary framework for maximizing influence propagation in social networks
- Author
-
Doina Bucur, Kateryna Konotopska, Giovanni Iacca, Alberto Tonda, Datamanagement & Biometrics, and Digital Society Institute
- Subjects
Social network ,Information transmission ,Theoretical computer science ,Computer science ,business.industry ,Process (engineering) ,Node (networking) ,Evolutionary algorithm ,Influence maximization ,Maximization ,Influence propagation ,business - Abstract
Social networks are one the main sources of information transmission nowadays. However, not all nodes in social networks are equal: in fact, some nodes are more influential than others, i.e., their information tends to spread more. Finding the most influential nodes in a network – the so-called Influence Maximization problem – is an NP-hard problem with great social and economical implications. Here, we introduce a framework based on Evolutionary Algorithms that includes various graph-aware techniques (spread approximations, domain-specific operators, and node filtering) that facilitate the optimization process. The framework can be applied straightforwardly to various social network datasets, e.g., those in the SNAP repository.
- Published
- 2021
19. A mathematical model for the prediction of the whey protein fouling mass in a pilot scale plate heat exchanger
- Author
-
Yingying Gu, Guillaume Delaplace, Laurent Bouvier, Alberto Tonda, Laboratoire de génie chimique [ancien site de Basso-Cambo] (LGC), Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées, Génie et Microbiologie des Procédés Alimentaires (GMPA), Institut National de la Recherche Agronomique (INRA)-AgroParisTech, Unité Matériaux et Transformations - UMR 8207 (UMET), Centre National de la Recherche Scientifique (CNRS)-Université de Lille-Ecole Nationale Supérieure de Chimie de Lille (ENSCL)-Institut National de la Recherche Agronomique (INRA), Institut de Chimie du CNRS (INC)-Institut National de la Recherche Agronomique (INRA)-Centre National de la Recherche Scientifique (CNRS)-Université de Lille-Ecole Nationale Supérieure de Chimie de Lille (ENSCL), and Institut National de la Recherche Agronomique (INRA)-Ecole Nationale Supérieure de Chimie de Lille (ENSCL)-Institut de Chimie du CNRS (INC)-Université de Lille-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Whey protein ,Materials science ,Fouling ,010401 analytical chemistry ,Plate heat exchanger ,Pilot scale ,Reynolds number ,04 agricultural and veterinary sciences ,040401 food science ,01 natural sciences ,0104 chemical sciences ,symbols.namesake ,0404 agricultural biotechnology ,Chemical engineering ,Casein ,[SDV.IDA]Life Sciences [q-bio]/Food engineering ,symbols ,[CHIM]Chemical Sciences ,[MATH]Mathematics [math] ,Solution flow ,ComputingMilieux_MISCELLANEOUS ,Food Science ,Biotechnology ,Dimensionless quantity - Abstract
A better understanding of protein fouling during the thermal treatment of whey protein concentrate (WPC) solutions is critical for better fouling control. In order to understand the impact of various parameters on the total whey protein fouling mass, a dimensional analysis was applied to the experimental data obtained from a pilot scale plate heat exchanger, setting total fouling mass as the target variable. A model was developed to predict the total fouling mass, covering a series of variables including whey protein solution concentration (2.5–25 g/L), calcium concentration (70-120 ppm), running time (90-330 min), fouling solution flow rate (200-500 L/h), total fouling surface area, outlet temperature (82-97 °C) and differences in whey protein concentrate powders. In addition to temperature dimensionless parameters, the main parameters involved in the model are the Reynolds number (2000-5000) and the calcium to β-lactoglobulin molar ratio (2.7–34.7). The model developed concerns only pure whey proteins solutions since all the testing solutions were casein free. This model has allowed us to provide guidelines as to how the above parameters influence fouling within the plate heat exchanger, as well as empirical correlations for predicting such fouling development.
- Published
- 2019
20. Promoting diversity in evolutionary optimization
- Author
-
Alberto Tonda and Giovanni Squillero
- Subjects
010201 computation theory & mathematics ,Computer science ,Evolutionary biology ,media_common.quotation_subject ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Evolutionary computation ,Diversity (politics) ,media_common - Published
- 2018
21. Applications of Evolutionary Computation
- Author
-
Gerd Ascheid, Paolo Burelli, Federico Divina, Mengjie Zhang, Anna I. Esparcia-Alcázar, Anthony Brabazon, Matt Coler, Antonio García, Giovanni Iacca, Evert Haasdijk, Stefano Cagnoni, Fabio D'Andreagiovanni, Francisco Vega, Paul Kaufmann, Trung Thanh Nguyen, Robert Schaefer, Jacqueline Heinerman, Ernesto Tarantino, Michalis Mavrovouniotis, Neil Urquhart, Alberto Tonda, Giovanni Squillero, Ting Hu, Carlos Cotta, Kevin Sim, Sara Silva, J. Ignacio Hidalgo, Jaume Bacardit, Kyrre Glette, and Michael Kampouridis
- Subjects
Signal processing ,Theoretical computer science ,Business analytics ,Natural computing ,Computer science ,Pattern recognition (psychology) ,Complex system ,Evolutionary algorithm ,Evolutionary robotics ,Evolutionary computation - Abstract
The two volumes LNCS 10199 and 10200 constitute the refereed conference proceedings of the 20th European Conference on the Applications of Evolutionary Computation, EvoApplications 2017, held in Amsterdam, The Netherlands, in April 2017, collocated with the Evo* 2016 events EuroGP, EvoCOP, and EvoMUSART. The 46 revised full papers presented together with 26 poster papers were carefully reviewed and selected from 108 submissions. EvoApplications 2016 consisted of the following 13 tracks: EvoBAFIN (natural computing methods in business analytics and finance), EvoBIO (evolutionary computation, machine learning and data mining in computational biology), EvoCOMNET (nature-inspired techniques for telecommunication networks and other parallel and distributed systems), EvoCOMPLEX (evolutionary algorithms and complex systems), EvoENERGY (evolutionary computation in energy applications), EvoGAMES (bio-inspired algorithms in games), EvoIASP (evolutionary computation in image analysis, signal processing, and pattern recognition), EvoINDUSTRY (nature-inspired techniques in industrial settings), EvoKNOW (knowledge incorporation in evolutionary computation), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoROBOT (evolutionary robotics), EvoSET (nature-inspired algorithms in software engineering and testing), and EvoSTOC (evolutionary algorithms in stochastic and dynamic environments).
- Published
- 2017
22. A Brief Introduction to Evolutionary Algorithms
- Author
-
Nathalie Perrot, Alberto Tonda, and Evelyne Lutton
- Subjects
business.industry ,Computer science ,Evolutionary algorithm ,Artificial intelligence ,business - Published
- 2016
23. Other titles from iSTE in Computer Engineering
- Author
-
Nathalie Perrot, Evelyne Lutton, and Alberto Tonda
- Subjects
Engineering ,Engineering drawing ,business.industry ,business - Published
- 2016
24. Model Analysis and Visualization
- Author
-
Nathalie Perrot, Evelyne Lutton, and Alberto Tonda
- Subjects
Computer science ,Computer graphics (images) ,Visualization - Published
- 2016
25. Modeling Human Expertise Using Genetic Programming
- Author
-
Nathalie Perrot, Alberto Tonda, and Evelyne Lutton
- Subjects
business.industry ,Computer science ,Genetic programming ,Artificial intelligence ,business ,Machine learning ,computer.software_genre ,computer - Published
- 2016
26. Interactive Model Learning
- Author
-
Evelyne Lutton, Nathalie Perrot, and Alberto Tonda
- Subjects
Computer science ,Human–computer interaction ,Model learning ,Robot learning - Published
- 2016
27. A Framework for Automated Detection of Power-related Software Errors in Industrial Verification Processes
- Author
-
Giovanni Squillero, Walter Ruzzarin, Ernesto Sanchez, Alberto Tonda, Stefano Gandini, dauin, Dipartimento di Automatica e Informatica [Torino] (DAUIN), Politecnico di Torino = Polytechnic of Turin (Polito)-Politecnico di Torino = Polytechnic of Turin (Polito), DAUIN Dipartimento di Automatica e Informatica, and Politecnico di Torino = Polytechnic of Turin (Polito)
- Subjects
[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR] ,Computer science ,02 engineering and technology ,[INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE] ,computer.software_genre ,Diagnostics ,Evolutionary algorithms ,Mobile phones ,Power consumption ,Software testing ,Testing tools ,diagnostics ,0202 electrical engineering, electronic engineering, information engineering ,Software quality analyst ,Software verification and validation ,evolutionary algorithms ,Electrical and Electronic Engineering ,mobile phones ,business.industry ,Software development ,software testing ,power consumption ,020207 software engineering ,[SPI.TRON]Engineering Sciences [physics]/Electronics ,Software framework ,Embedded system ,Software construction ,Personal software process ,020201 artificial intelligence & image processing ,business ,Software engineering ,computer ,Software quality control ,Software verification ,testing tools - Abstract
International audience; The complexity of cell phones is continually increasing, with regards to both hardware and software parts. As many complex devices, their components are usually designed and verified separately by specialized teams of engineers and programmers. However, even if each isolated part is working flawlessly, it often happens that bugs in one software application arise due to the interaction with other modules. Those software misbehaviors become particularly critical when they affect the residual battery life, causing power dissipation. An automatic approach to detect power-affecting software defects is proposed. The approach is intended to be part of a qualifying verification plan and complete human expertise. Motorola, always at the forefront of researching innovations in the product development chain, experimented the approach on a mobile phone prototype during a partnership with Politecnico di Torino. Software errors unrevealed by all human-designed tests have been detected by the proposed framework, two out of three critical from the power consumption point of view, thus enabling Motorola to further improve its verification plans. Details of the tests and experimental results are presented.
- Published
- 2010
28. Malware Obfuscation through Evolutionary Packers
- Author
-
Andrea Marcelli, Giovanni Squillero, Alberto Tonda, Marco Gaudesi, Ernesto Sanchez, Politecnico di Torino [Torino] (Polito), Génie et Microbiologie des Procédés Alimentaires (GMPA), Institut National de la Recherche Agronomique (INRA)-AgroParisTech, Politecnico di Torino = Polytechnic of Turin (Polito), and AgroParisTech-Institut National de la Recherche Agronomique (INRA)
- Subjects
Software_OPERATINGSYSTEMS ,Computer science ,[SDV]Life Sciences [q-bio] ,Malware obfuscation ,Botnet ,Evolutionary computation ,virus ,02 engineering and technology ,Intrusion detection system ,Computer security ,computer.software_genre ,Cryptovirology ,Obfuscation (software) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,evolutionary packers ,Malware ,020201 artificial intelligence & image processing ,computer - Abstract
A malicious botnet is a collection of compromised hosts coordinated by an external entity. The malicious software, or malware, that infect the systems are its basic units and they are responsible for its global behavior. Anti Virus software and Intrusion Detection Systems detect botnets by analyzing network and files, looking for signature and known behavioral patterns. Thus, the malware hiding capability is a crucial aspect. This paper describes a new obfuscation mechanism based on evolutionary algorithms: an evolutionary core is embedded in the malware to generate a different, optimized hiding strategy for every single infection. Such always-changing, hard-to-detect malware can be used by security industries to stress the analysis methodologies and to test the ability to react to malware mutations. This research is the first step in a more ambitious research project, where a whole botnet, composed of different malware and Anti Virus software, is analyzed as a prey-predator ecosystem.
- Published
- 2015
29. Is Global Sensitivity Analysis Useful to Evolutionary Computation?
- Author
-
Evelyne Lutton, Alberto Tonda, Thomas Chabin, Génie et Microbiologie des Procédés Alimentaires (GMPA), and Institut National de la Recherche Agronomique (INRA)-AgroParisTech
- Subjects
business.industry ,[SDV]Life Sciences [q-bio] ,Evolutionary algorithm ,Sampling (statistics) ,Model parameters ,Space (commercial competition) ,Machine learning ,computer.software_genre ,Evolutionary computation ,Global sensitivity analysis ,global sensitivity analysis ,Artificial intelligence ,evolutionary algorithms ,business ,computer ,Counterexample ,Mathematics - Abstract
Global Sensitivity Analysis (GSA) studies how uncertainty in the inputs of a system influences uncertainty in its outputs. GSA is extensively used by experts to gather information about the behavior of models, through computationally-intensive stochastic sampling of parameters' space. Some studies propose to make use of the considerable quantity of data acquired in this way to optimize the model parameters, often resorting to Evolutionary Algorithms (EAs). Nevertheless, efficiently exploiting information gathered from GSA might not be so straightforward. In this paper, we present a counterexample followed by experimental results to prove how naively combining GSA and EA can bring about negative outcomes.
- Published
- 2015
30. The tradeoffs between data delivery ratio and energy costs in wireless sensor networks
- Author
-
Alberto Tonda, Doina Bucur, Giovanni Iacca, and Giovanni Squillero
- Subjects
Routing protocol ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Pareto principle ,020206 networking & telecommunications ,Protocol analysis ,02 engineering and technology ,Energy consumption ,0202 electrical engineering, electronic engineering, information engineering ,State space ,020201 artificial intelligence & image processing ,business ,Collection Tree Protocol ,Wireless sensor network ,Protocol (object-oriented programming) ,Computer network - Abstract
Wireless sensor network (WSN) routing protocols, e.g., the Collection Tree Protocol (CTP), are designed to adapt in an ad-hoc fashion to the quality of the environment. WSNs thus have high internal dynamics and complex global behavior. Classical techniques for performance evaluation (such as testing or verification) fail to uncover the cases of extreme behavior which are most interesting to designers. We contribute a practical framework for performance evaluation of WSN protocols. The framework is based on multi-objective optimization, coupled with protocol simulation and evaluation of performance factors. For evaluation, we consider the two crucial functional and non-functional performance factors of a WSN, respectively: the ratio of data delivery from the network (DDR), and the total energy expenditure of the network (COST). We are able to discover network topological configurations over which CTP has unexpectedly low DDR and/or high COST performance, and expose full Pareto fronts which show what the possible performance tradeoffs for CTP are in terms of these two performance factors. Eventually, Pareto fronts allow us to bound the state space of the WSN, a fact which provides essential knowledge to WSN protocol designers.
- Published
- 2014
31. Towards automated malware creation
- Author
-
Marco Gaudesi, Ernesto Sanchez, Giovanni Squillero, Andrea Cani, and Alberto Tonda
- Subjects
021110 strategic, defence & security studies ,malware ,Computer science ,0211 other engineering and technologies ,Subject (documents) ,virus ,02 engineering and technology ,Evolutionary algorithms ,computer.software_genre ,Computer security ,Cryptovirology ,Trojan ,Security ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Operating system ,Malware ,020201 artificial intelligence & image processing ,Code generation ,computer - Abstract
This short paper proposes two different ways for exploiting an evolutionary algorithm to devise malware: the former targeting heuristic-based anti-virus scanner; the latter optimizing a Trojan attack. An extended internal on the same the subject can be downloaded from http://www.cad.polito.it/downloads/
- Published
- 2014
32. Resources
- Author
-
Ernesto Sanchez, Giovanni Squillero, and Alberto Tonda
- Published
- 2012
33. Automatic Software Verification
- Author
-
Ernesto Sánchez, Alberto Tonda, and Giovanni Squillero
- Subjects
High-level verification ,Software ,business.industry ,Computer science ,Software construction ,Verification ,Software system ,Software verification and validation ,Software engineering ,business ,Software verification ,Intelligent verification - Abstract
The complexity of cell phones is continually increasing, with regards to both hardware and software parts. As many complex devices, their components are usually designed and verified separately by specialized teams of engineers and programmers. However, even if each isolated part is working flawlessly, it often happens that bugs in one software application arise due to the interaction with other modules. Those software misbehaviors become particularly critical when they affect the residual battery life, causing power dissipation. An automatic approach to detect power-affecting software defects is proposed. The approach is intended to be part of a qualifying verification plan and complete human expertise. Motorola, always at the forefront of researching innovations in the product development chain, experimented the approach on a mobile phone prototype during a partnership with Politecnico di Torino. Software errors unrevealed by all human-designed tests have been detected by the proposed framework, two out of three critical from the power consumption point of view, thus enabling Motorola to further improve its verification plans. Details of the tests and experimental results are reported.
- Published
- 2012
34. Development of On-Line Test Sets for Microprocessors
- Author
-
Giovanni Squillero, Ernesto Sánchez, and Alberto Tonda
- Subjects
business.industry ,Computer science ,law.invention ,Test (assessment) ,Set (abstract data type) ,Microprocessor ,Microcontroller ,Software ,law ,Test set ,Embedded system ,Fault coverage ,Reduced cost ,business - Abstract
In software-based self-test (SBST) a microprocessor executes a set of test programs devised for detecting the highest possible percentage of faults. The main advantages of this approach are its high defect fault coverage (being performed at-speed) and the reduced cost (since it does not require any change in the processor hardware). SBST can also be used for on-line test of a microprocessor-based system. However, some additional constraints exist in this case (e.g. in terms of test length and duration, as well as intrusiveness). This paper faces the issue of automatically transforming a test set devised for manufacturing test in a test set suitable for on-line test. Experimental results are reported on an Intel 8051 microcontroller. Preliminary results have been published in [133].
- Published
- 2012
35. Introduction
- Author
-
Ernesto Sanchez, Giovanni Squillero, and Alberto Tonda
- Published
- 2012
36. Software-Based Self-Testing on Microprocessors
- Author
-
Giovanni Squillero, Alberto Tonda, and Ernesto Sánchez
- Subjects
Multi-core processor ,Finite-state machine ,Computer science ,business.industry ,Cycles per instruction ,OpenRISC ,law.invention ,Microprocessor ,Software ,Computer engineering ,law ,Fault coverage ,Fault model ,business - Abstract
Microprocessor testing is becoming a challenging task, due to the increasing complexity of modern architectures. Nowadays, most architectures are tackled with a combination of scan chains and Software-Based Self-Test (SBST) methodologies. Among SBST techniques, evolutionary feedback-based ones prove effective in microprocessor testing: their main disadvantage, however, is the considerable time required to generate suitable test programs. A novel evolutionary-based approach, able to appreciably reduce the generation time, is presented. The proposed method exploits a high-level representation of the architecture under test and a dynamically built Finite State Machine (FSM) model to assess fault coverage without resorting to time-expensive simulations on low-level models. Experimental results, performed on an OpenRISC processor, show that the resulting test obtains a nearly complete fault coverage against the targeted fault model.
- Published
- 2012
37. Uncovering Path Delay Faults with Multi-Objective EAs
- Author
-
Alberto Tonda, Giovanni Squillero, and Ernesto Sánchez
- Subjects
Microcontroller ,Theoretical computer science ,Computer engineering ,Exploit ,Path delay ,Binary decision diagram ,Computer science ,Cycles per instruction ,Evolutionary algorithm ,Fault injection ,Fault (power engineering) - Abstract
This chapter presents an innovative approach for the generation of test programs detecting path-delay faults in microprocessors. The proposed method takes advantage of the multiobjective implementation of a previously devised evolutionary algorithm and exploits both gate- and RT-level descriptions of the processor: the former is used to build Binary Decision Diagrams (BDDs) for deriving fault excitation conditions; the latter is used for the automatic generation of test programs able to excite and propagate fault effects, based on a fast RTL simulation. Experiments on an 8-bit microcontroller show that the proposed method is able to generate suitable test programs more efficiently compared to existing approaches. Preliminary results have been published in [10].
- Published
- 2012
38. Post-silicon Speed-Path Analysis in Modern Microprocessors through Genetic Programming
- Author
-
Giovanni Squillero, Ernesto Sánchez, and Alberto Tonda
- Subjects
Exploit ,business.industry ,Computer science ,media_common.quotation_subject ,Evolutionary algorithm ,Genetic programming ,Chip ,law.invention ,Automatic test equipment ,Microprocessor ,Debugging ,law ,Software engineering ,business ,Path analysis (computing) ,media_common - Abstract
The incessant progress in manufacturing technology is posing new challenges to microprocessor designers. Nowadays, comprehensive verification of a chip can only be performed after tape-out, when the first silicon prototypes are available. Several activities that were originally supposed to be part of the pre-silicon design phase are migrating to this post-silicon time as well. This chapter describes a post-silicon methodology that can be exploited to devise functional failing tests. Such tests are essential to analyze and debug speed paths during verification, speed-stepping, and other critical activities. The proposed methodology is based on the Genetic Programming paradigm, and exploits a versatile toolkit named μGP. The chapter describes how an evolutionary algorithm can successfully tackle a significant and still open industrial problem. Moreover, it shows how to take into account complex hardware characteristics and architectural details of such complex devices. The experimental evaluation clearly demonstrate the potential of this line of research. Results of this work have been accepted for publication in [137].
- Published
- 2012
39. Drift Correction of Chemical Sensors
- Author
-
Alberto Tonda, Ernesto Sánchez, and Giovanni Squillero
- Subjects
Statistical classification ,Exploit ,Sensor array ,Computer science ,Pattern recognition (psychology) ,Stability (learning theory) ,Process control ,Control engineering ,Limit (mathematics) ,Evolution strategy - Abstract
Artificial olfaction systems that try to mimic human olfaction by using arrays of gas chemical sensors combined with pattern recognition methods represent a potentially economic tool in many areas of industry such as: perfumery, food and drinks production, clinical diagnosis, health and safety, environmental monitoring and process control. However, successful applications of these systems are still largely limited to specialized laboratories. Among others, sensor drift, the lack of stability over time still limit real industrial setups. This chapter presents and discusses an evolutionary based adaptive drift-correction method designed to work with state-of-the-art classification algorithms. The proposed system exploits a leading-edge evolutionary strategy to iteratively tweak the coefficients of a linear transformation able to transparently transform raw sensors measures in order to mitigate negative effects of the drift. The optimal correction strategy is learned without a-priori models or other hypothesis on the behavior of physical-chemical sensors. Preliminary results have been published in [49].
- Published
- 2012
40. Software-Based Self Testing of System Peripherals
- Author
-
Alberto Tonda, Ernesto Sánchez, and Giovanni Squillero
- Subjects
Measure (data warehouse) ,Software ,Computer engineering ,Exploit ,Computer science ,business.industry ,Fault coverage ,Benchmark (computing) ,people.profession ,Test engineer ,people ,business ,Test (assessment) - Abstract
Traditional test generation methodologies for peripheral cores are performed by a skilled test engineer, leading to long generation times. In this paper a test generation methodology based on an evolutionary tool which exploits high level metrics is presented. To strengthen the correlation between high-level coverage and the gate-level fault coverage, in the case of peripheral cores, the FSMs embedded in the system are identified and then dynamically extracted via simulation, while transition coverage is used as a measure of how much the system is exercised. The results obtained by the evolutionary tool outperform those obtained by a skilled engineer on the same benchmark. Preliminary results have been published in [127].
- Published
- 2012
41. Corrigendum to 'Food model exploration through evolutionary optimization coupled with visualization: Application to the prediction of a milk gel structure' [INNFOO/25 (2014) 67–77]
- Author
-
Alain Riaublanc, Sébastien Gaucel, Evelyne Lutton, Alberto Tonda, and Nathalie Perrot
- Subjects
0106 biological sciences ,Structure (mathematical logic) ,Computer science ,04 agricultural and veterinary sciences ,General Chemistry ,computer.software_genre ,Bioinformatics ,040401 food science ,01 natural sciences ,Industrial and Manufacturing Engineering ,Visualization ,0404 agricultural biotechnology ,010608 biotechnology ,Data mining ,computer ,Food Science - Published
- 2015
42. Towards drift correction in chemical sensors using an evolutionary strategy
- Author
-
Giovanni Squillero, Stephano Di Carlo, Ernesto Sanchez, Alberto Tonda, Matteo Falasconi, Alberto Scionti, dauin, Dipartimento di Automatica e Informatica [Torino] (DAUIN), Politecnico di Torino = Polytechnic of Turin (Polito)-Politecnico di Torino = Polytechnic of Turin (Polito), DAUIN Dipartimento di Automatica e Informatica, and Politecnico di Torino = Polytechnic of Turin (Polito)
- Subjects
artificial olfaction ,Exploit ,Computer science ,Mechanism (biology) ,business.industry ,BIOINFORMATICS ,Fingerprint (computing) ,02 engineering and technology ,[INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE] ,Machine learning ,computer.software_genre ,algorithms applications ,drift correction ,evolutionary strategies ,0202 electrical engineering, electronic engineering, information engineering ,[SPI.GPROC]Engineering Sciences [physics]/Chemical and Process Engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Evolution strategy ,computer - Abstract
International audience; Gas chemical sensors are strongly affected by the so-called drift, i.e., changes in sensors' response caused by poisoning and aging that may significantly spoil the measures gathered. The paper presents a mechanism able to correct drift, that is: delivering a correct unbiased fingerprint to the end user. The proposed system exploits a state-of-the-art evolutionary strategy to iteratively tweak the coefficients of a linear transformation. The system operates continuously. The optimal correction strategy is learnt without a-priori models or other hypothesis on the behavior of physical-chemical sensors. Experimental results demonstrate the efficacy of the approach on a real problem.
- Published
- 2010
43. A novel methodology for diversity preservation in evolutionary algorithms
- Author
-
Alberto Tonda, Giovanni Squillero, and Politecnico di Torino = Polytechnic of Turin (Polito)
- Subjects
business.industry ,Computer science ,Entropy (statistical thermodynamics) ,[SDV]Life Sciences [q-bio] ,Evolutionary algorithm ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,Entropy (classical thermodynamics) ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Entropy (information theory) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Data mining ,evolutionary algorithms ,Entropy (energy dispersal) ,business ,computer ,Evolutionary programming - Abstract
In this paper we describe an improvement of an entropy-based diversity preservation approach for evolutionary algorithms. This approach exploits the information contained not only in the parts that compose an individual, but also in their position and relative order. We executed a set of preliminary experiments in order to test the new approach, using two different problems in which diversity preservation plays a major role in obtaining good solutions.
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.