Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica - Tesi di Dottorato: Recent submissions
Items 21-40 di 199
-
Design of point contact solar cell by means of 3D numerical simulations
(Università della Calabria -Dottorato di Ricerca in Information and Communication Engineering For Pervasive Intelligent Environments, 2017-11-13)Nikola Tesla said that "the sun maintains all human life and supplies all human energy". As a matter of fact, sun furnishes with energy all forms of living, e.g., starting from the photosynthesis process, plants absorb ... -
Efficient incremental algorithms for handling graph data
(2017-11-13) -
Data mining techniques for large and complex data
(2017-11-13)During these three years of research I dedicated myself to the study and design of data mining techniques for large quantities of data. Particular attention was devoted to training set condensing techniques for the ... -
Design of back contact solar cells featuring metallization schemes with multiple emitter contact lines based on TCAD numerical simulations
(2017-11-13)The most hard-working goal within PV community is to design and manufacture devices featuring high-efficiency at low-cost with the better reliability as possible. The key to achieving this target is to optimize and improve ... -
Ensemble learning techniques for cyber security applications
(2017-07-13)Cyber security involves protecting information and systems from major cyber threats; frequently, some high-level techniques, such as for instance data mining techniques, are be used to efficiently fight, alleviate the ... -
mm-Wave Antennas For Satellite And Mobile Communications
(2017-07-26)Ever growing demands for higher data rate and bandwidth are pushing wireless applications to millimetre-wave band (3-300GHz), where sufficient bandwidth is available and high performance can be achieved without using complex ... -
Requirements engineering for complex systems
(2017-07-26)Requirements Engineering (RE) is a part of Software Engineering and, in general, of System Engineering. RE aims to help in building software which satis es the user needs, eliciting, documenting, validating and maintaining ... -
Distribution, Reuse and Interoperability of simulation models in heterogeneous distributed computing environments
(2017-07-26)Modeling and Simulation (M&S) is gaining a central role in several industrial domains such as automotive, e-science and aerospace, due to the increasing complexity of system requirements and thus of the related engineering ... -
<<A>> methodology for the development of autonomic and cognitive internet of things ecosystems
(2018-06-08)Advancements on microelectromechanical systems, embedded technologies, and wireless communications have recently enabled the evolution of conven- tional everyday things in enhanced entities, commonly de ned Smart ... -
Malevolent Activities Detection and Cyber Range Scenarios Orchestration
(2018-06-08)increasing availability of Internet accessible services driven by the di usion of connected devices. The consequent exposition to cyber-threats demands for suitable methodologies, techniques and tools allowing to adequately ... -
Global Optimization, Ordinary Differential Equations and Infinity Computing
(2018-06-08)La tesi consiste in 4 capitoli. I primi due capitoli riguardano l’ottimizzazione globale utilizzando il framework dei computer tradizionali, mentre gli altri due capitoli riguardano l’utilizzo della nuova tipologia dei ... -
Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing
(2018-08-06)Commodity operating systems, both on desktop and mobile devices, offer rich functionality and consequently a significant attack surface. A compromise of the operating system, however, means that an attacker also has access ... -
SiGe BicMOS Building Blocks for 5G Applications
(2019-01-18)SiGe BiCMOS semiconductor technology has been increasing its application domain especially for the development of complex microwave monolithically integrated circuits (MMIC) required for modern telecommunication systems. ... -
Anomalies in cyber security: detection, prevention and simulation approaches
(2018-07-03)With themassive adoption of the Internet both our private andworking life has drastically changed. The Internet has introduced new ways to communicate and complete every day tasks. Organisations of any kind have taken ... -
Scalable data analysis: methods, tools and applications
(2017-07-26)