7 results on '"Giuliano, Romeo"'
Search Results
2. On the coexistence of power-controlled ultrawide-band systems with UMTS, GPS, DCS1800, and fixed wireless systems
- Author
-
Giuliano, Romeo and Mazzenga, Franco
- Subjects
Wireless telecommunications equipment -- Usage ,Bandwidth -- Analysis ,Wireless telecommunications equipment ,Bandwidth allocation ,Bandwidth technology ,Business ,Electronics ,Electronics and electrical industries ,Transportation industry - Abstract
Ultrawide bandwidth (UWB) wireless technology will play a key role in short-range wireless connectivity supporting very high bit rates availability, low power consumption, and location capabilities. UWB can be conveniently deployed in the design of wireless local and personal area networks, providing advanced integrated multimedia services to nomadic users within hot-spot areas. The very large bandwidth required by the UWB signals cannot be exclusively allocated; thus, UWB band overlaps with the bands 2allocated to many other narrow-band systems. Therefore, the assessment of the interference caused by UWB devices on already-existing systems is of primary importance to ensure coexistence and, therefore, to guarantee acceptance of UWB technology worldwide. In this paper, we study the coexistence issues between an UWB-based system and universal mobile telecommunication systems, global positioning sytems, DCS1800, and fixed wireless access systems and point-to-point (PP) links terminals. UWB interference is evaluated accounting for the UWB signal model, a realistic UWB master/slave system architecture with power-controlled terminals. Furthermore, we analyze the dependence of the UWB interference from the UWB signal parameters and demonstrate through computer simulation that, in all practical cases, a UWB system can coexist with the selected victim terminals without causing any dangerous interference. Index Terms--Fourth-generation (4G) communication systems, system coexistence, ultrawide-band signals.
- Published
- 2005
3. IMPERSONAL: An IoT-Aided Computer Vision Framework for Social Distancing for Health Safety
- Author
-
Anna Maria Vegni, Romeo Giuliano, Alessandro Vizzarri, Franco Mazzenga, Eros Innocenti, Giuliano, Romeo, Innocenti, Ero, Mazzenga, Franco, Vegni, ANNA MARIA, and Vizzarri, Alessandro
- Subjects
Coronavirus disease 2019 (COVID-19) ,Computer Networks and Communications ,Computer science ,business.industry ,Distancing ,Social distance ,Track (rail transport) ,Computer Science Applications ,law.invention ,Bluetooth ,Hardware and Architecture ,law ,Human–computer interaction ,Order (business) ,Information and Communications Technology ,Signal Processing ,Internet of Things ,business ,Information Systems - Abstract
Recently, pushed by COVID-19 pandemic, the need of respecting social distancing has motivated several researchers to define novel technological solutions to monitor and track user movements. Information and Communications Technologies (ICT) world has addressed this challenge by means of the use of different technologies, such as Bluetooth, in order to track user inter-distance and encounter time. Technology solutions should be able to not only track contacts, but also alert users to restore social distancing. In this paper, we present IMPERSONAL framework, with the twofold aim of both (i) tracking and monitoring social distancing, and (ii) alerting users in case of gatherings. The framework is based on a sub-network of computer vision-based devices that is adopted to monitor and track users’movements to estimate their inter-distance and compute the encounter time. Such information is then the input to an Internet of Things sub-network, aiming to retrieve the anonymous IDs of people belonging to a gathering, as well as to send alert messages to them. We assess IMPERSONAL framework by means of extensive Monte Carlo simulations and experimental results, showing its effectiveness in terms of accuracy in correctly identifying users and gatherings in videos taken from live cameras, both in case of indoor and outdoor real scenarios. The benefits of IMPERSONAL framework are expressed in terms of the ability to track people, solve gatherings and send warning messages. IEEE
- Published
- 2022
- Full Text
- View/download PDF
4. A joint Computer Vision and Reconfigurable Intelligent Meta-surface Approach for Interference Reduction in Beyond 5G Networks
- Author
-
Romeo Giuliano, Valeria Loscri, Eros Innocenti, Franco Mazzenga, Anna Maria Vegni, Self-organizing Future Ubiquitous Network (FUN), Inria Lille - Nord Europe, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Digital Signal Processing Multimedia & Optical Communications Laboratory [Rome] (COMLAB), Università degli Studi Roma Tre, Department of Engineering Science, Guglielmo Marconi University [Roma], Department of Enterprise Engineering Mario Lucertini, Università degli Studi di Roma Tor Vergata [Roma], This work is partially supported by the Exploratory Action ETHICAM., IEEE, Loscrí, Valeria, Vegni, ANNA MARIA, Innocenti, Ero, Giuliano, Romeo, Mazzenga, Franco, and Università degli Studi Roma Tre = Roma Tre University (ROMA TRE)
- Subjects
business.industry ,Wireless network ,Computer science ,Reliability (computer networking) ,Computer Vision ,020208 electrical & electronic engineering ,010401 analytical chemistry ,Phase (waves) ,[SCCO.COMP]Cognitive science/Computer science ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,B5G ,Beam Steering ,Interference (communication) ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Computer vision ,Artificial intelligence ,Radio frequency ,Reconfigurable Intelligent Meta-surface ,business ,5G ,Coding (social sciences) - Abstract
International audience; Reconfigurable Intelligent Meta-surfaces (RIMs) are particular devices able to control and manipulate radio frequency wireless signals. This promising technology allows to improve the reliability of wireless networks, thanks to the capacity of reflecting the desired signals through appropriate phase shifts. The joint use of RIMs and Computer Vision (CV) technology is the main objective of this paper. This synergistic approach is used to correctly identify the specific configuration of a radiation pattern, to be used as input for computing optimal coding sequences of the RIM. Indeed, by the means of a CV algorithm it is possible to infer a connectivity graph related to a real scenario, where people is moving. The information about network nodes such as their distance, the relative position, etc. is used for feeding an intelligent logic, able to compute the optimal configuration for redirecting the signals towards a given receiver target node. Numerical results show the huge potentiality of this combined approach in terms of interference reduction. It has been observed that for high traffic load, it is possible to reduce the average interference in the network of 40%. Furthermore, an analysis including the positioning estimation error of the CV algorithm has been addressed, in order to consider how it affects the interference reduction. Results show that, even though there is an increasing effect of interference, when the error is accounted, the interference reduction impact is still important.
- Published
- 2021
5. Integrated Public Mobile Radio Networks/Satellite for Future Railway Communications
- Author
-
Alessandro Neri, Romeo Giuliano, Francesco Rispoli, Franco Mazzenga, Mazzenga, Franco, Giuliano, Romeo, Neri, Alessandro, and Rispoli, Francesco
- Subjects
Mobile radio ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,Settore ING-INF/03 - Telecomunicazioni ,business.industry ,Computer science ,020302 automobile design & engineering ,020206 networking & telecommunications ,02 engineering and technology ,Multipath TCP ,Computer Science Applications ,European Train Control System ,0203 mechanical engineering ,Software deployment ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Train ,Mobile telephony ,business ,Telecommunications ,Protocol (object-oriented programming) ,Computer network - Abstract
The European train control system employs GSM-R for communications between trains and the command/control centers. GSM-R technology is quite old and will be replaced in the near future by other technologies offering less expensive solutions, especially for regional and local lines. This article investigates a new telecommunication solution based on multi radio bearers using cellular and satellite public networks as an alternative to the deployment of a dedicated infrastructure. A test campaign on a 300 km of rail line (about 10,000 km of tests) has been carried out to evaluate the performance of cellular and satellite networks in a railway environment. Test trial results presented and discussed in this article have been used to assess the performance of a multipath TCP protocol to effectively support multi-bearer communications. A discussion of the economic benefits and the potential industrial implications of the proposed solution concludes the article.
- Published
- 2017
- Full Text
- View/download PDF
6. Security access protocols in IoT capillary networks
- Author
-
Franco Mazzenga, Alessandro Neri, Anna Maria Vegni, Romeo Giuliano, Giuliano, Romeo, Mazzenga, Franco, Neri, Alessandro, and Vegni, ANNA MARIA
- Subjects
Computer science ,Computer Networks and Communications ,02 engineering and technology ,Security association ,Bidirectional/unidirectional data transmissions, communication system security, Internet-of-Things (IoT) ,Smart city ,0202 electrical engineering, electronic engineering, information engineering ,Bidirectional/unidirectional data transmissions ,Access network ,SIMPLE (military communications protocol) ,business.industry ,Settore ING-INF/03 - Telecomunicazioni ,020206 networking & telecommunications ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Computer Science Applications ,Communication system security ,Internet-of-Things (IoT) ,Signal Processing ,Information Systems ,Hardware and Architecture ,Benchmark (computing) ,Key (cryptography) ,020201 artificial intelligence & image processing ,Transmission time ,business ,Computer network - Abstract
Smart city services are enabled by a massive use of Internet of Things (IoT) technologies. The huge amount of sensors, and terminals with a great variety of typologies and applications, requires a secure way to manage them. Capillary networks can be seen as a short range extension of conventional access network in order to efficiently capture the IoT traffic, and are enablers for smart city services. They can include both IP and non-IP devices, and security can become an issue, especially when simple unidirectional communication devices are considered. The main goal of this paper is to analyze security aspects in IoT capillary networks including unidirectional and bidirectional IP or non-IP devices. We propose an algorithm for secure access for uni- and bi-directional devices. The security procedure is based on a secure key renewal (without any exchange in air), considering a local clock time and a time interval of key validity. Following previous work in 2014 by Giuliano et al. , in this paper we assess the duration of the validity of the time window, and present extended simulation results in terms of (average) transmission time in a realistic scenario, i.e., including the presence of disturber(s), then providing indications for the setting of the duration of the key validity time window. Finally, we present the benchmark analysis in order to assess the effectiveness of our approach with respect to other existing standards, as well as the security analysis in terms of typical attacks.
- Published
- 2017
7. Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals
- Author
-
Franco Mazzenga, Alessandro Neri, Anna Maria Vegni, Romeo Giuliano, IEEE, Giuliano, R, Mazzenga, F, Neri, Alessandro, Vegni, ANNA MARIA, Giuliano, Romeo, and Mazzenga, Franco
- Subjects
Access network ,Terminal (telecommunication) ,Network packet ,business.industry ,Computer science ,media_common.quotation_subject ,Smart city ,Default gateway ,Key (cryptography) ,Overhead (computing) ,business ,Function (engineering) ,Software ,Computer network ,media_common - Abstract
To provide advanced services to citizens, Smart City services are enabled by a massive use of Internet of Things (IoT) technologies. The envisaged huge amount of sensors, and terminals with a great variety of typologies and applications, do not allow having a unique way to manage them, requiring for example minimal packaging and presentation overhead for many of them. In general in a network providing Smart City services, both IP and non-IP devices are present. In this paper, we tackle the security issue for non-IP devices able to connect by a short-range with a mediator gateway, forming a capillary access network, which can be seen as a short range extension of conventional access network in order to efficiently capture the IoT traffic. In particular, we propose security algorithms both for uni- and bi-directional terminals, depending on the terminal capabilities. The security algorithms are based on a local key renewal (without any exchange in air), performed just considering the local clock time. Performance are obtained respect to the maximum number of terminals that can be managed by one mediator gateway and the maximum packet delay as a function of the number of terminals in the area. © 2014 IEEE.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.