About
23
Publications
18,988
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
56
Citations
Introduction
Current institution
Education
December 2012 - October 2017
September 2009 - February 2011
September 2005 - July 2009
Publications
Publications (23)
he COVID-19 pandemic, caused by the SARS-CoV-2 virus, has emerged as one of the most significant global crises of this century, with severe health and socio-economic impacts worldwide. Existing research has highlighted the critical role of comorbidities in influencing COVID-19 outcomes, but effective prediction models remain a challenge. This study...
This work studies projective self-dual (PSD) and self-polar linear codes over finite fields with q elements, where q is a power of a prime. The possible parameters for which PSD codes may exist are presented, and many examples are provided. Algorithms for checking whether a q-ary linear code is self-polar are described. Many PSD and self-polar code...
In this paper, we present a library with sequential and parallel functions for computing some of the most important cryptographic characteristics of Boolean and vectorial Boolean functions. The library implements algorithms to calculate the nonlinearity, algebraic degree, autocorrelation, differential uniformity and related tables of vectorial Bool...
This paper presents a new type of multithreaded and multicore microcontroller. The aim is to provide more computing power for embedded applications, like the ones developed for smart cities. Through parallelism, our microcontroller is able to run multiple tasks, either independent or cooperating, like getting data from sensors, analysing them, taki...
In this paper, we present a system prototype for monitoring the deformation and stability of different types of critical constructions. This system can be applied in order to achieve a higher level of risk management and safer working conditions. The system can have a wide application, for example it can be used as a real-time system for detecting...
The Reed-Muller transform is widely used in discrete mathematics and cryptography, in particular for computing the algebraic normal form of Boolean functions. This is a good reason to look for ways to optimize the implementation of the algorithm. Here we present different ways for optimization based on the bitwise representation of the true table v...
In this report we present the results of the analysis of burglary data provided by Catalonian Police Department and we propose different approaches to derive predicting models, thus improving the algorithms that the police are now using. In particular we propose an algorithm to derive connections between different regions of Catalonia, that is to say...
We investigate several cryptographic properties in 8-bit S-boxes obtained by quasigroups of order 4 and 16 with several different algebraic constructions. Additionally, we offer a new construction of N-bit S-boxes by using different number of two layers – the layer of bijectional quasigroup string transformations, and the layer of modular addition...
The utilization of all computational resources is significant to achieve efficient computation. In order to exploit the available computation resources, we combine two parallel programming models such as MPI and CUDA. Combining of these two programming models ensures usage of the whole computation resources available in one computer system (CPU and...
The aim of this paper is to construct S-boxes of different sizes with good cryptographic properties. An algebraic construction for bijective S-boxes is described. It uses quasi-cyclic representations of the binary simplex code. Good S-boxes of sizes 4, 6, 8, 9, 10, 11, 12, 14, 15, 16 and 18 are obtained.
COOP Drive is an on-line shopping system recently started by COOP Liguria. Customers place their orders on-line, which are then processed by employees and collected at the time chosen by the customer. The problem proposed by COOP consists of two main parts: i) optimizing the staff schedule in COOP Drive ii) understanding if and to what extent such...
Some of the most important cryptographic characteristics of the Boolean and vector Boolean functions (nonlinearity, autocorrelation, differential uniformity) are connected with the Walsh spectrum. In this paper, we present several algorithms for computing the Walsh spectrum implemented in CUDA for parallel execution on GPU. They are based on the mo...
One of the most important cryptographic characteristics of the Boolean and vector Boolean functions is the algebraic degree which is connected with the Algebraic Normal Form. In this paper, we present an algorithm for computing the Algebraic Normal Form of a Boolean function using binary Fast Möbius (Reed-Muller) Transform implemented in CUDA for p...
To develop an intelligent optimization algorithm to coordinate the frequency selection at the back end (for radio resource management purposes), in unmanaged, partially cooperative urban environments where not all the hotspots can be configured.
WiFi networks are one of the main access technologies to the Internet thanks to their low cost and easy deployment. However, this may impact performance as the deployment is often unmanaged, unplanned and clearly not optimal. Having a large number of WiFi hotspots within the same coverage area, they may operate in interfering frequencies with diffe...
In this paper we present a construction for S-boxes using quasi-cyclic codes. We obtain S-boxes with good nonlinearity.
This paper discusses different approaches for computing the Walsh spectra on graphics processor unite (GPU) using CUDA C. Here we present the results from several experiments that evaluate the performance of NVIDIA processors, implementing on two GPU with different performances. The conclusions from experiments made indicate what speed-ups can be e...
Assessing of costs in SMEs is a difficult endeavor. There are several factors that contribute. Many of these factors are of a technical nature, such as development costs or integration costs. A substantial part of the costs are caused by organizational factors such as changes in the introduction of an IT system on business processes or the cost of...
Introduction to object-oriented programming (OOP) can be difficult for beginners in programming, especially if only pure code is used. To facilitate learning and understanding the concept of OOP many Java Integrated Development Environments (IDEs), that contains a lot of visual elements, are developed. Adding the visualization make programming easi...
There are many works that report on the application of sensor networks in different areas, such as agriculture, habitat monitoring, health care, etc. This paper presents an ongoing project that uses sensor network to monitor the conditions in vine cellar. The aim of this approach is to design a system for monitoring the parameters relevant for stan...
To increase the practical experience and knowledge of their students, many ?Computer Security? courses offer some software tools and real vulnerable code examples. Bearing in mind that hacking real applications is illegal and it is subject to prosecution by law, different instructors use legal means and tools for it. It is important to discuss real...
Wireless Sensor Networks are new emerging technology used in various applications for habitat, health and air pollution monitoring, vehicle tracking etc. Every sensor node is powered with battery that must last for mounts or years which constrains the WSN in term of energy used. Other critical issue is the secure communication between the nodes and...