-
Body-UAV Near-Ground LoRa Links through a Mediterranean Forest
Authors:
Giulio Maria Bianco,
Gaetano Marrocco
Abstract:
LoRa low-power wide-area network protocol has recently gained attention for deploying ad-hoc search and rescue (SaR) systems. They could be empowered by exploiting body-UAV links that enable communications between a body-worn radio and a UAV-mounted one. However, to employ UAVs effectively, knowledge of the signal's propagation in the environment is required. Otherwise, communications and localiza…
▽ More
LoRa low-power wide-area network protocol has recently gained attention for deploying ad-hoc search and rescue (SaR) systems. They could be empowered by exploiting body-UAV links that enable communications between a body-worn radio and a UAV-mounted one. However, to employ UAVs effectively, knowledge of the signal's propagation in the environment is required. Otherwise, communications and localization could be hindered. The radio range, the packet delivery ratio (PDR), and the large- and small-scale fading of body-UAV LoRa links at 868 MHz when the radio wearer is in a Mediterranean forest are here characterized for the first time with a near-ground UAV having a maximum flying height of 30 m. A log-distance model accounting for the body shadowing and the wearer's movements is derived. Over the full LoRa radio range of about 600 m, the new model predicts the path loss (PL) better than the state-of-the-art ones, with a reduction of the median error even by 10 dB. The observed small-scale fading is severe and follows a Nakagami-m distribution. Extensions of the model for similar scenarios can be drawn through appropriate corrective factors.
△ Less
Submitted 25 March, 2023; v1 submitted 17 March, 2023;
originally announced March 2023.
-
Automatic Monitoring of Fruit Ripening Rooms by UHF RFID Sensor Network and Machine Learning
Authors:
Cecilia Occhiuzzi,
Francesca Camera,
Michele D'Orazio,
Nicola D'Uva,
Sara Amendola,
Giulio Maria Bianco,
Carolina Miozzi,
Luigi Garavaglia,
Eugenio Martinelli,
Gaetano Marrocco
Abstract:
Accelerated ripening through the exposure of fruits to controlled environmental conditions and gases is nowadays one of the most assessed food technologies, especially for climacteric and exotic products. However, a fine granularity control of the process and consequently of the quality of the goods is still missing, so the management of the ripening rooms is mainly based on qualitative estimation…
▽ More
Accelerated ripening through the exposure of fruits to controlled environmental conditions and gases is nowadays one of the most assessed food technologies, especially for climacteric and exotic products. However, a fine granularity control of the process and consequently of the quality of the goods is still missing, so the management of the ripening rooms is mainly based on qualitative estimations only. Following the modern paradigms of Industry 4.0, this contribution proposes a non-destructive RFID-based system for the automatic evaluation of the live ripening of avocados. The system, coupled with a properly trained automatic classification algorithm based on Support Vector Machines (SVMs), can discriminate the stage of ripening with an accuracy greater than 85%.
△ Less
Submitted 13 May, 2022; v1 submitted 26 April, 2022;
originally announced April 2022.
-
Toxic Code Snippets on Stack Overflow
Authors:
Chaiyong Ragkhitwetsagul,
Jens Krinke,
Matheus Paixao,
Giuseppe Bianco,
Rocco Oliveto
Abstract:
Online code clones are code fragments that are copied from software projects or online sources to Stack Overflow as examples. Due to an absence of a checking mechanism after the code has been copied to Stack Overflow, they can become toxic code snippets, e.g., they suffer from being outdated or violating the original software license. We present a study of online code clones on Stack Overflow and…
▽ More
Online code clones are code fragments that are copied from software projects or online sources to Stack Overflow as examples. Due to an absence of a checking mechanism after the code has been copied to Stack Overflow, they can become toxic code snippets, e.g., they suffer from being outdated or violating the original software license. We present a study of online code clones on Stack Overflow and their toxicity by incorporating two developer surveys and a large-scale code clone detection. A survey of 201 high-reputation Stack Overflow answerers (33% response rate) showed that 131 participants (65%) have ever been notified of outdated code and 26 of them (20%) rarely or never fix the code. 138 answerers (69%) never check for licensing conflicts between their copied code snippets and Stack Overflow's CC BY-SA 3.0. A survey of 87 Stack Overflow visitors shows that they experienced several issues from Stack Overflow answers: mismatched solutions, outdated solutions, incorrect solutions, and buggy code. 85% of them are not aware of CC BY-SA 3.0 license enforced by Stack Overflow, and 66% never check for license conflicts when reusing code snippets. Our clone detection found online clone pairs between 72,365 Java code snippets on Stack Overflow and 111 open source projects in the curated Qualitas corpus. We analysed 2,289 non-trivial online clone candidates. Our investigation revealed strong evidence that 153 clones have been copied from a Qualitas project to Stack Overflow. We found 100 of them (66%) to be outdated, of which 10 were buggy and harmful for reuse. Furthermore, we found 214 code snippets that could potentially violate the license of their original software and appear 7,112 times in 2,427 GitHub projects.
△ Less
Submitted 1 April, 2019; v1 submitted 20 June, 2018;
originally announced June 2018.
-
Scalar multiplication in compressed coordinates in the trace-zero subgroup
Authors:
Giulia Bianco,
Elisa Gorla
Abstract:
We consider trace-zero subgroups of elliptic curves over a degree three field extension. The elements of these groups can be represented in compressed coordinates, i.e. via the two coefficients of the line that passes through the point and its two Frobenius conjugates. In this paper we give the first algorithm to compute scalar multiplication in the degree three trace-zero subgroup using these coo…
▽ More
We consider trace-zero subgroups of elliptic curves over a degree three field extension. The elements of these groups can be represented in compressed coordinates, i.e. via the two coefficients of the line that passes through the point and its two Frobenius conjugates. In this paper we give the first algorithm to compute scalar multiplication in the degree three trace-zero subgroup using these coordinates.
△ Less
Submitted 13 September, 2017;
originally announced September 2017.
-
Compression for trace zero points on twisted Edwards curves
Authors:
Giulia Bianco,
Elisa Gorla
Abstract:
We propose two optimal representations for the elements of trace zero subgroups of twisted Edwards curves. For both representations, we provide efficient compression and decompression algorithms. The efficiency of the algorithm is compared with the efficiency of similar algorithms on elliptic curves in Weierstrass form.
We propose two optimal representations for the elements of trace zero subgroups of twisted Edwards curves. For both representations, we provide efficient compression and decompression algorithms. The efficiency of the algorithm is compared with the efficiency of similar algorithms on elliptic curves in Weierstrass form.
△ Less
Submitted 27 July, 2015;
originally announced July 2015.