scispace - formally typeset
Search or ask a question
Author

Armir Bujari

Bio: Armir Bujari is an academic researcher from University of Padua. The author has contributed to research in topics: The Internet & Mobile computing. The author has an hindex of 18, co-authored 85 publications receiving 1107 citations.


Papers
More filters
Journal ArticleDOI
03 Nov 2018-Sensors
TL;DR: GeoSaW, a delay-tolerant routing protocol for Airborne Networks in Search and Rescue scenarios that exploits the geographical information of UAVs to make appropriate message forwarding decisions.
Abstract: In this paper, we propose GeoSaW, a delay-tolerant routing protocol for Airborne Networks in Search and Rescue scenarios. The protocol exploits the geographical information of UAVs to make appropriate message forwarding decisions. More precisely, the information about the future UAV’s motion path is exploited to select the best UAV carrying the message towards the destination. Simulation results show that the proposed solution outperforms the classic DTN routing protocols in terms of several performance metrics.

133 citations

Journal ArticleDOI
TL;DR: The existing mobility models are listed and guidance is provided to understand whether they could be actually adopted depending on the specific flying ad-hoc network application scenarios, while discussing their advantages and disadvantages.
Abstract: Flying ad-hoc networks are becoming a promising solution for different application scenarios involving unmanned aerial vehicles, like urban surveillance or search and rescue missions. However, such...

125 citations

Journal ArticleDOI
TL;DR: This work focuses on the state-of-the-art, stateless geographic packet routing protocols conceived or adapted for three-dimensional network scenarios, and evaluated over a common scenario through a comprehensive comparative analysis.
Abstract: Scalable routing for wireless communication systems is a compelling and challenging task. To this aim, routing algorithms exploiting geographic information have been proposed. These algorithms refer to nodes by their location, rather than their address, and use those coordinates to route greedily towards a destination. With the advent of unmanned airborne vehicle (UAV) technology, a lot of research effort has been devoted to extend position-based packet routing proposals to three dimensional environments. In this context, Flying Ad-hoc Networks (FANETs), comprised of autonomous flying vehicles, pose several issues. This work focuses on the state-of-the-art, stateless geographic packet routing protocols conceived or adapted for three-dimensional network scenarios. Proposals are evaluated over a common scenario through a comprehensive comparative analysis.

92 citations

Journal ArticleDOI
TL;DR: This analysis shows four major issues that may limit the use of IoT (i.e., interoperability, security, privacy, and business models) and it highlights possible solutions to solve these problems.
Abstract: The number of physical objects connected to the Internet constantly grows and a common thought says the IoT scenario will change the way we live and work. Since IoT technologies have the potential to be pervasive in almost every aspect of a human life, in this paper, we deeply analyze the IoT scenario. First, we describe IoT in simple terms and then we investigate what current technologies can achieve. Our analysis shows four major issues that may limit the use of IoT (i.e., interoperability, security, privacy, and business models) and it highlights possible solutions to solve these problems. Finally, we provide a simulation analysis that emphasizes issues and suggests practical research directions.

85 citations

Proceedings ArticleDOI
12 Apr 2012
TL;DR: Movement pattern recognition in day-by-day urban street behavior is discussed, restricting at recognizing situations when a pedestrian stops, crosses a street ruled by a traffic light; to do so, data comes from the accelerometer of the pedestrian's smartphone.
Abstract: Sensor-enabled smartphone's have become a mainstream platform for researchers due to their ability to collect and process large quantities of data, hence creating new opportunities for innovative applications. Yet, the limits in employing sensors to opportunistically detect human behaviors are not clear and deserve investigation. To this purpose, in this article, we discuss movement pattern recognition in day-by-day urban street behavior. As a case study, we restrict at recognizing situations when a pedestrian stops, crosses a street ruled by a traffic light; to do so we only use data coming from the accelerometer of the pedestrian's smartphone.

81 citations


Cited by
More filters
01 Jan 2016
TL;DR: The flow the psychology of optimal experience is universally compatible with any devices to read as mentioned in this paper and is available in our digital library an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading flow the psychology of optimal experience. As you may know, people have search numerous times for their chosen readings like this flow the psychology of optimal experience, but end up in infectious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside their desktop computer. flow the psychology of optimal experience is available in our digital library an online access to it is set as public so you can get it instantly. Our digital library saves in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Merely said, the flow the psychology of optimal experience is universally compatible with any devices to read.

1,993 citations

Journal ArticleDOI
TL;DR: Evaluated two of the most viable communication standards, Institute of Electrical and Electronics Engineers (IEEE) 802.11p and long-term evolution (LTE) by 3rd Generation Partnership Project for vehicular networking show acceptable performance for sparse network topologies with limited mobility support and validated the effectiveness of both standards to handle different application requirements.
Abstract: Various wireless communication systems exist, which enable a wide range of applications and use cases in the vehicular environment. These applications can be grouped into three types, namely, road safety, traffic efficiency, and infotainment, each with its own set of functional and performance requirements. In pursuance of assisting drivers to travel safely and comfortably, several of these requirements have to be met simultaneously. While the coexistence of multiple radio access technologies brings immense opportunities towards meeting most of the vehicular networking application requirements, it is equally important and challenging to identify the strength and weaknesses of each technology and understand which technology is more suitable for the given networking scenario. In this paper, we evaluate two of the most viable communication standards, Institute of Electrical and Electronics Engineers (IEEE) 802.11p and long-term evolution (LTE) by 3rd Generation Partnership Project for vehicular networking. A detailed performance evaluation study of the standards is given for a variety of parameter settings such as beacon transmission frequency, vehicle density, and vehicle average speed. Both standards are compared in terms of delay, reliability, scalability, and mobility support in the context of various application requirements. Furthermore, through extensive simulation-based study, we validated the effectiveness of both standards to handle different application requirements and share insight for further research directions. The results indicate that IEEE 802.11p offers acceptable performance for sparse network topologies with limited mobility support. On the other hand, LTE meets most of the application requirements in terms of reliability, scalability, and mobility support; however, it is challenging to obtain stringent delay requirements in the presence of higher cellular network traffic load.

350 citations

Journal ArticleDOI
TL;DR: A survey on existing works in the MCS domain is presented and a detailed taxonomy is proposed to shed light on the current landscape and classify applications, methodologies, and architectures to outline potential future research directions and synergies with other research areas.
Abstract: Mobile crowdsensing (MCS) has gained significant attention in recent years and has become an appealing paradigm for urban sensing. For data collection, MCS systems rely on contribution from mobile devices of a large number of participants or a crowd. Smartphones, tablets, and wearable devices are deployed widely and already equipped with a rich set of sensors, making them an excellent source of information. Mobility and intelligence of humans guarantee higher coverage and better context awareness if compared to traditional sensor networks. At the same time, individuals may be reluctant to share data for privacy concerns. For this reason, MCS frameworks are specifically designed to include incentive mechanisms and address privacy concerns. Despite the growing interest in the research community, MCS solutions need a deeper investigation and categorization on many aspects that span from sensing and communication to system management and data storage. In this paper, we take the research on MCS a step further by presenting a survey on existing works in the domain and propose a detailed taxonomy to shed light on the current landscape and classify applications, methodologies, and architectures. Our objective is not only to analyze and consolidate past research but also to outline potential future research directions and synergies with other research areas.

320 citations

Journal ArticleDOI
18 Jun 2020
TL;DR: This article analyses a set of possible evolution paths for the DT considering its possible usage as a major enabler for the softwarization process.
Abstract: Digital twin (DT) is an emerging concept that is gaining attention in various industries It refers to the ability to clone a physical object (PO) into a software counterpart The softwarized object, termed logical object, reflects all the important properties and characteristics of the original object within a specific application context To fully determine the expected properties of the DT, this article surveys the state-of-the-art starting from the original definition within the manufacturing industry It takes into account related proposals emerging in other fields, namely augmented and virtual reality (eg, avatars), multiagent systems, and virtualization This survey thereby allows for the identification of an extensive set of DT features that point to the “softwarization” of POs To properly consolidate a shared DT definition, a set of foundational properties is identified and proposed as a common ground outlining the essential characteristics (must-haves) of a DT Once the DT definition has been consolidated, its technical and business value is discussed in terms of applicability and opportunities Four application scenarios illustrate how the DT concept can be used and how some industries are applying it The scenarios also lead to a generic DT architectural model This analysis is then complemented by the identification of software architecture models and guidelines in order to present a general functional framework for the DT This article, eventually, analyses a set of possible evolution paths for the DT considering its possible usage as a major enabler for the softwarization process

275 citations

Journal ArticleDOI
01 Dec 2018
TL;DR: A comprehensive survey of the latest IDSs designed for the IoT model, with a focus on the corresponding methods, features, and mechanisms, and deep insight into the IoT architecture, emerging security vulnerabilities, and their relation to the layers of the IoT Architecture is provided.
Abstract: One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a technology for building smart environments. Security and privacy are considered key issues in any real-world smart environment based on the IoT model. The security vulnerabilities in IoT-based systems create security threats that affect smart environment applications. Thus, there is a crucial need for intrusion detection systems (IDSs) designed for IoT environments to mitigate IoT-related security attacks that exploit some of these security vulnerabilities. Due to the limited computing and storage capabilities of IoT devices and the specific protocols used, conventional IDSs may not be an option for IoT environments. This article presents a comprehensive survey of the latest IDSs designed for the IoT model, with a focus on the corresponding methods, features, and mechanisms. This article also provides deep insight into the IoT architecture, emerging security vulnerabilities, and their relation to the layers of the IoT architecture. This work demonstrates that despite previous studies regarding the design and implementation of IDSs for the IoT paradigm, developing efficient, reliable and robust IDSs for IoT-based smart environments is still a crucial task. Key considerations for the development of such IDSs are introduced as a future outlook at the end of this survey.

240 citations