Silicon nanowires, whose thermal conductivity is strongly reduced with respect to that of the bulk silicon, are very promising for high-efficient thermoelectric conversion. This work focuses on the development of a technique for the fabrication of...
Nanostructured silicon is a promising material for thermoelectric conversion because the thermal conductivity in silicon nanostructures can be strongly reduced with respect to that of bulk materials. We present thermal conductivity measurements,...
Silicon is a material with very good thermoelectric properties, with regard to Seebeck coefficient and electrical conductivity. Low thermal conductivities, and hence high thermal to electrical conversion efficiencies, can be achieved in nanostructures,...
Conventional techniques for thermal conductivity measurements can lead to unreliable results when applied to nanostructures because heaters and temperature sensors needed for the measurement cannot have a negligible size and therefore perturb the...
We discuss processes for the fabrication of devices for thermoelectric generation, based on silicon nanostructures. The main issue that we address is the design and development of fabrication processes for devices exploiting a large number of...
This work presents a fully digital implementation of an audio front-end for portable applications developed in a low-power perspective. Such platform acquires audio samples through a four digital Pulse Digital Modulation (PDM) microphones array and...
Voice Activity Detectors (VADs) are used to enhance performances and to reduce the activation rate of speech recognition and key-word spotting applications. The last aspect is crucial for portable applications because it allows to save energy,...
Nowadays Voice User Interfaces (VUIs) have become popular thanks to their easiness of use that makes them accessible to the elderly and people with disability. Nevertheless, their use in embedded systems for the realization of portable devices is...
Recursive Systematic Convolutional (RSC) codes are the building blocks of the modern communication systems. In this paper we propose a new analytical model to manipulate the modulo-2 algebraic operations and a finite state machine model describing the...
Several humanoid robots will require to navigate in unsafe and unstructured environments, such as those after a disaster, for human assistance and support. To achieve this, humanoids require to construct in real-time, accurate maps of the environment...
The widespread of ransomware experienced in the last years has been caused also by the ability of attackers to introduce changes and mutations that make the malware hard to identify from antimalware software. In this paper we propose a two-phase method...
The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and usage control mechanisms, for...
Modern interconnected systems of systems, such as the Internet of Things (IoT), demand the presence of access and usage control mechanisms which will be able to manage the right of access to the corresponding services, and the plethora of information...
Distributed environments such as Internet of Things, have an increasing need of introducing access and usage control mechanisms, to manage the rights to perform specific operations and regulate the access to the plethora of information daily generated...
Autonomous Underwater Vehicles (AUVs) are offering new capabilities for a wide range of military and civilian applications. The interoperability of heterogeneous AUVs with different skills is critical to accomplish such complex tasks. Indeed, the...
Seamless authentication is a desired feature which is becoming more and more relevant, due to the distribution of personal and wearable mobile devices. With seamless authentication, biometric features such as human gait, become a way to control...
Human gait seamless continuous authentication, based on wearable accelerometers, is a novel biometric instrument which can be exploited to identify the user of mobile and wearable devices. In this paper, we present a study on recognition of user...
Parental Control functionalities currently included in Smart TVs, DBS decoders and Pay TV services are cumbersome to use, not flexible and, in the end, are seldom used. This paper presents a framework for dynamic enforcement of parental control policies...
The work analyses the cybersecurity weakness in state-of-art automotive in-vehicle networks and discusses possible countermeasures at architecture level. Due to stringent real-time constraints (throughput and latency) of fail-safe automotive...
Tenants in a cloud environment run services, such as Virtual Network Function instantiations, that may legitimately generate millions of packets per second. The hosting platform, hence, needs robust packet scheduling mechanisms that support these rates...