Michele Pagano’s research while affiliated with University of Pisa and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (212)


Low-Complexity Microclimate Classification in Smart Greenhouses: A Fuzzy-Neural Approach
  • Article

May 2025

·

3 Reads

·

·

Michele Pagano

·

[...]

·

Maintaining optimal microclimatic conditions within greenhouses represents a significant challenge in modern agricultural contexts, where prediction systems play a crucial role in regulating temperature and humidity, thereby enabling timely interventions to prevent plant diseases or adverse growth conditions. In this work, we propose a novel approach which integrates a cascaded Feed-Forward Neural Network (FFNN) with the Granular Computing paradigm to achieve accurate microclimate forecasting and reduced computational complexity. The experimental results demonstrate that the accuracy of our approach is the same as that of the FFNN-based approach but the complexity is reduced, making this solution particularly well suited for deployment on edge devices with limited computational capabilities. Our innovative approach has been validated using a real-world dataset collected from four greenhouses and integrated into a distributed network architecture. This setup supports the execution of predictive models both on sensors deployed within the greenhouse and at the network edge, where more computationally intensive models can be utilized to enhance decision-making accuracy.



Figure 1. Mean delay performance evaluation for the M/GPD/1 simulation
Extending the Applicability of the Pollaczek-Khinchin Formula to the Case of Infinite Service Moments
  • Article
  • Full-text available

September 2024

·

116 Reads

IEEE Transactions on Communications

In teletraffic engineering, M/G/1 queues are pivotal for optimizing network performance and operational efficiency. Closed formulas like the mean-value Pollaczek-Khinchin (MV-PK) are highly valued by practitioners due to their simplicity, facilitating rapid and flexible system analyses. This formula aids in verifying the reliability of complex simulations concerning M/G/1 models, especially when applicable. The challenge intensifies when dimensioning M/G/1 systems with heavy-tailed service time distributions. Simulation of such queues becomes notably arduous, necessitating increased number of samples and longer simulation durations. Moreover, verification becomes more intricate as the MV-PK formula cannot be straightforwardly applied in such cases. This paper extends the MV-PK formula to heavy tailed service distributions with infinite/infinitesimal moments using Nonstandard Analysis. Additionally , it shows how recently introduced Bounded Algo-rithmic Numbers (BANs) enables numerical verification of the extended PK formula via discrete-event simulations of the M/G/1 queue, even when predicted delay values are infinite. The implemented approach tends to converge fast and exhibits remarkable numerical robustness. It adheres to the principle of "write once, run multiple times", as the same source code for queue simulation handles both finite and infinite variance cases. Index Terms-M/G/1 model, heavy-tailed service time distribution , queuing system simulation, Pollaczek-Khinchin formula , Nonstandard Analysis.

Download

Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator

August 2024

·

40 Reads

·

2 Citations

Quantum computers have the potential to break the public-key cryptosystems widely used in key exchange and digital signature applications. To address this issue, quantum key distribution (QKD) offers a robust countermeasure against quantum computer attacks. Among various QKD schemes, BB84 is the most widely used and studied. However, BB84 implementations are inherently imperfect, resulting in quantum bit error rates (QBERs) even in the absence of eavesdroppers. Distinguishing between QBERs caused by eavesdropping and QBERs due to channel imperfections is fundamentally infeasible. In this context, this paper proposes and examines a practical method for detecting eavesdropping via partial intercept-and-resend attacks in the BB84 protocol. A key feature of the proposed method is its consideration of quantum system noise. The efficacy of this method is assessed by employing the Quantum Solver library in conjunction with backend simulators inspired by real quantum machines that model quantum system noise. The simulation outcomes demonstrate the method’s capacity to accurately estimate the eavesdropper’s interception density in the presence of system noise. Moreover, the results indicate that the estimation accuracy of the eavesdropper’s interception density in the presence of system noise is dependent on both the actual interception density value and the key length.


Regenerative Analysis and Approximation of Queueing Systems with Superposed Input Processes

July 2024

·

33 Reads

A single-server queueing system with n classes of customers, stationary superposed input processes, and general class-dependent service times is considered. An exponential splitting is proposed to construct classical regeneration in this (originally non-regenerative) system, provided that the component processes have heavy-tailed interarrival times. In particular, we focus on input processes with Pareto interarrival times. Moreover, an approximating GI/G/1-type system is considered, in which the independent identically distributed interarrival times follow the stationary Palm distribution corresponding to the stationary superposed input process. Finally, Monte Carlo and regenerative simulation techniques are applied to estimate and compare the stationary waiting time of a customer in the original and in the approximating systems, as well as to derive additional information on the regeneration cycles’ structure.


Figure 1. Reinforcement learning mechanism for the SD-WAN scenario
Figure 2. An example of SD-WAN in a rural scenario that exploits three tunnels from different technologies.
Figure 6. Number of actions for each type of traffic in the three algorithms.
Figure 7. Reward trend deep Q-learning.
Comparison with LTE-only scenario.
Enhancing Reliability in Rural Networks Using a Software-Defined Wide Area Network

April 2024

·

90 Reads

·

2 Citations

Due to limited infrastructure and remote locations, rural areas often need help providing reliable and high-quality network connectivity. We propose an innovative approach that leverages Software-Defined Wide Area Network (SD-WAN) architecture to enhance reliability in such challenging rural scenarios. Our study focuses on cases in which network resources are limited to network solutions such as Long-Term Evolution (LTE) and a Low-Earth-Orbit satellite connection. The SD-WAN implementation compares three tunnel selection algorithms that leverage real-time network performance monitoring: Deterministic, Random, and Deep Q-learning. The results offer valuable insights into the practical implementation of SD-WAN for rural connectivity scenarios, showing its potential to bridge the digital divide in underserved areas.




A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions

December 2023

·

922 Reads

·

12 Citations

The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core network architecture, i.e., the Access and Mobility Management Function (AMF) and the Network Repository Function/Network Exposure Function (NRF/NEF) of the Service-Based Architecture (SBA). Focusing on the Service-Based Interface (SBI) of these exposed NFs, the analysis not only identifies potential security gaps but also underscores the crucial role of Mobile Network Operators (MNOs) in implementing robust security measures. Furthermore, given the shift towards Network Function Virtualization (NFV), this paper emphasizes the importance of secure development practices to enhance the integrity of 5G network functions. In essence, this paper underscores the significance of scrutinizing security vulnerabilities in open-source 5G projects, particularly within the core network’s SBI and externally exposed NFs. The research outcomes provide valuable insights for MNOs, enabling them to establish effective security measures and promote secure development practices to safeguard the integrity of 5G network functions. Additionally, the empirical investigation aids in identifying potential vulnerabilities in open-source 5G projects, paving the way for future enhancements and standard releases.


Numerical verification for the Euclidean Gaussian having infinite theoretical mean µ = (−1.5 + 20.33η − 403.26η 2 )α 1 and finite theoretical variance σ 2 = (11.56 − 97.444η + 217.044η 2 ).
Modelling Heavy Tailed Phenomena Using a LogNormal Distribution Having a Numerically Verifiable Infinite Variance

April 2023

·

221 Reads

·

3 Citations

One-sided heavy tailed distributions have been used in many engineering applications, ranging from teletraffic modelling to financial engineering. In practice, the most interesting heavy tailed distributions are those having a finite mean and a diverging variance. The LogNormal distribution is sometimes discarded from modelling heavy tailed phenomena because it has a finite variance, even when it seems the most appropriate one to fit the data. In this work we provide for the first time a LogNormal distribution having a finite mean and a variance which converges to a well-defined infinite value. This is possible thanks to the use of Non-Standard Analysis. In particular, we have been able to obtain a Non-Standard LogNormal distribution, for which it is possible to numerically and experimentally verify whether the expected mean and variance of a set of generated pseudo-random numbers agree with the theoretical ones. Moreover, such a check would be much more cumbersome (and sometimes even impossible) when considering heavy tailed distributions in the traditional framework of standard analysis.


Citations (69)


... The CRYSTALS-Dilithium signature system for key setup has demonstrated resilience against both classical and quantum attacks (Nguyen et al. 2023;Fiorini et al. 2024;Chunduru et al. 2024;Yin et al. 2013). Additionally, in the execution of fully homomorphic encryption (FHE) under quantum-secure federated learning (QSE-FL), we utilize the Cheon-Kim-Kim-Song (CKKS) scheme (Cheon et al. 2017). ...

Reference:

Enhanced federated learning for secure medical data collaboration
Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator

... Through combining the Deep Neural Networks and Convolutional Neural Network, the ability of IDS was enhanced in [19]. A probabilistic data [20] to process traffic data for attack detection. The technique reduces the false alarm rate. ...

A Real Time Deep Learning Based Approach for Detecting Network Attacks
  • Citing Article
  • February 2024

Big Data Research

... Particularly with emerging technologies like Autonomous Vehicles (AVs) network connectivity becomes pivotal, elevating the significance of NWDAF's impact on Handover (HO) operations. Also, when User Equipment (UE) (i.e., which denotes an equipment with a Subscriber Identity Module (Dolente et al., 2024), mobility which is one of the use cases standardized by 3GPP (3GPP, 2024) is considered, deploying an NWDAF instance could address possible problems (e.g., ping-pong effect) that may be occurred in future states. For this, an NWDAF instance is not only responsible for generating statistical results but also creates predictive analytics about future network conditions. ...

A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions

... BANs, recently introduced in [26], constitute a fixed-length representation for Euclidean numbers, akin to IEEE floating-point numbers, which can be represented on a conventional computer. Moreover, they have recently enabled the pseudo-random generation of distributions with well-specified infinite variance (see for example the results in [27]). In this work, leveraging their Matlab implementation, we will numerically reassess the infinite queuing delay values predicted by theory against the sampled ones provided by the simulation of the M/G/1 queue with heavy-tailed service time. ...

Modelling Heavy Tailed Phenomena Using a LogNormal Distribution Having a Numerically Verifiable Infinite Variance

... It carries very much refined data, which are stated at the packet level. It, therefore, provides a lot of information to the researchers that they can utilize in analyzing the traffic, the bandwidth, and the effects of various protocols in the enhancement of the networks [32]. ...

On the proper choice of datasets and traffic features for real-time anomaly detection

Journal of Physics Conference Series

... Through a combination of theoretical analysis and extensive field measurements, the authors evaluated the link quality and transmission performance of LoRa. Their findings identified the optimal configuration parameters for both the lightly dense and very dense forest settings, offering valuable insights into the impact of frequency bands and other settings on the overall performance of LoRa networks in challenging environmental conditions [29]. ...

Design, Implementation and Evaluation of a LoRa Packet Generator for Forest Environments

... При этом стационарный режим работы таких систем является хорошо изученным как для случая пуассоновского, так и коррелированного входного потока. Отметим лишь некоторые последние работы по данной теме [1][2][3][4][5][6][7]. ...

Two-Phase Resource Queueing System with Requests Duplication and Renewal Arrival Process
  • Citing Chapter
  • January 2020

Lecture Notes in Computer Science

... As a rule, when studying multi-server systems, it is usually assumed that the servers are identical and that arriving requests can occupy an arbitrary server to be serviced. QSs with heterogeneous servers are much less frequently studied, which makes them a more interesting object of research [28][29][30][31][32][33][34]. Nontrivial optimization problems often arise related to the assignment of servers to arriving orders depending on the ratio of the service rates of the facilities and the costs of their use. ...

Analysis of a Resource-Based Queue with the Parallel Service and Renewal Arrivals
  • Citing Chapter
  • January 2020

Lecture Notes in Computer Science

... To study a random process that describes the total volumes of consumed resource capacities, dynamic probabilities are introduced, the meaning of which is to consider only those requests with their own volumes that have not completed their service. The asymptotic analysis method is used to solve the problem of analyzing the total amount of occupied resources of each type provided that the request servicing intensity is much lower than the arriving flow intensity and assuming that the servers have unlimited resources [32,33]. ...

Heterogeneous System GI/GI(n)∕∞ with Random Customers Capacities
  • Citing Chapter
  • August 2020