- Sparse and Compressive Sensing Techniques
- Analog and Mixed-Signal Circuit Design
- Cellular Automata and Applications
- Chaos control and synchronization
- Neural Networks and Applications
- Blind Source Separation Techniques
- Wireless Communication Networks Research
- Chaos-based Image/Signal Encryption
- Fuzzy Logic and Control Systems
- Advancements in PLL and VCO Technologies
- Fault Detection and Control Systems
- Radio Frequency Integrated Circuit Design
- Advanced Wireless Communication Techniques
- Energy Harvesting in Wireless Networks
- Anomaly Detection Techniques and Applications
- Electromagnetic Compatibility and Noise Suppression
- Electrical and Bioimpedance Tomography
- Quantum chaos and dynamical systems
- Advanced Power Amplifier Design
- ECG Monitoring and Analysis
- Mathematical Dynamics and Fractals
- Distributed Sensor Networks and Detection Algorithms
- Control Systems and Identification
- Advanced DC-DC Converters
- Image and Signal Denoising Methods
University of Bologna
2016-2025
Polytechnic University of Turin
2019-2024
King Abdullah University of Science and Technology
2023-2024
Kiel University
2024
Fachhochschule Kiel
2024
Toronto Metropolitan University
2023
Delft University of Technology
2023
Laboratori Guglielmo Marconi (Italy)
2022-2023
Marconi University
2022-2023
University College Cork
2018
This paper and its companion are devoted to the evaluation of impact chaos-based techniques on communications systems with asynchronous code division multiple access. Sequences obtained by repeating a truncated quantized chaotic time series compared classical m-sequences Gold sequences means performance index taken from communication theory which is here defined thoroughly discussed. analysis reveals that, unlike conventional sequences, spreading codes can be generated for any number users...
We present a true random number generator which, contrary to other implementations, is not based on the explicit observation of complex micro-cosmic processes but standard signal processing primitives, freeing designer from need for dedicated hardware. The system can be implemented now ubiquitous analog-to-digital converters building blocks, and therefore well-suited embedding. On current technologies, design permits data rates in order few tens megabits per second. Furthermore, absence...
We present a true random number generator which, contrary to other implementations, is not based on the explicit observation of complex micro-cosmic processes but standard signal processing primitives, freeing designer from need for dedicated hardware. The system can be implemented now ubiquitous analog-to-digital converters building blocks, and therefore well-suited embedding. On current technologies, design permits data rates in order few tens megabits per second. Furthermore, absence...
In this paper we review some statistical tests included in the NIST SP 800-22 suite, which is a collection of for evaluation both true-random (physical) and pseudorandom (algorithmic) number generators cryptographic applications. The output these so-called <formula formulatype="inline" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex Notation="TeX">$p$</tex></formula> -value random variable whose distribution converges to uniform interval [0,1]...
The idea that compressed sensing may be used to encrypt information from unauthorised receivers has already been envisioned, but never explored in depth since its security seem compromised by the linearity of encoding process. In this paper we apply simple define a general private-key encryption scheme which transmitter distributes same encoded measurements different classes, are provided partially corrupted matrices and thus allowed decode acquired signal at provably levels recovery...
We present the design and validation by means of suitably improved randomness tests two different implementations high-performance true-random number generators which use a discrete-time chaotic circuit as their entropy source. The proposed system has been developed from standard pipeline Analog-to-Digital converter (ADC) design, modified to operate set piecewise-linear maps. evolution each map is observed quantized obtain random bit stream. With this approach it possible obtain, on current...
The need for fast and strong image cryptosystems motivates researchers to develop new techniques apply traditional cryptographic primitives in order exploit the intrinsic features of digital images. One most popular mature technique is use complex dynamic phenomena, including chaotic orbits quantum walks, generate required key stream. In this paper, under assumption plaintext attacks we investigate security a classic diffusion mechanism (and its variants) used as core primitive some based on...
Spread spectrum is a technique introduced for mitigating electromagnetic interference (EMI) problems in many class of circuits. In this paper, with particular emphasis on switching DC/DC converters, we consider the most common and efficient known spreading techniques, looking parameters that ensure highest EMI reduction lowest performance circuit where applied. The result an interesting tradeoff not only between drop, but also itself when considering different victim models. proposed...
We report the design and implementation of an Analog-to-Information Converter (AIC) based on Compressed Sensing (CS). The system is realized in a CMOS 180 nm technology targets acquisition bio-signals with Nyquist frequency up to 100 kHz. To maximize performance reduce hardware complexity, we co-design together reconstruction algorithms. resulting AIC outperforms previously proposed solutions mainly thanks two key features. First, adopt novel method deal saturations computation CS...
Machine data (MD), that is, generated by machines, are increasingly gaining importance, potentially surpassing the value of extensively discussed personal data. We present a theoretical analysis MD market, addressing challenges such as fragmentation, ambiguous property rights, and public-good nature MD. consider machine users producing aggregators providing analytics services (e.g., with digital twins for real-time simulation optimization). By analyzing learning algorithms, we identify...
The application of chaotic dynamics to signal processing tasks stems from the realization that its complex behavior becomes tractable when observed a statistical perspective. Here we illustrate validity this statement by considering two noteworthy problems-namely, synthesis high-electromagnetic compatibility clock signals and generation spreading sequences for direct-sequence code-division communication systems, showing how approach discrete-time systems can be applied find their optimal...
The approximation capability of the Takagi-Sugeno model are investigated in this paper. This kind features a functional consequent which is usually first-degree polynomial inputs. importance constant term such highlighted showing that if it discarded same power simpler constant-consequence systems.
For pt.I see G. Mazzini et al., vol.44, pp.937-47 (Oct. 1997). This paper and its companion (Part I) are devoted to the evaluation of impact chaos-based techniques on communications systems with asynchronous Code Division Multiple Access. In Part I, a performance index was introduced exploited priori estimate DS-CDMA based chaotic spreading sequences, compare it that conventional systems. Here, tools from nonlinear dynamical system theory employed give formal ground for those results....
Design of Random Modulation Pre-Integration systems based on the restricted-isometry property may be suboptimal when energy signals to acquired is not evenly distributed, i.e. they are both sparse and localized. To counter this, we introduce an additional design criterion, that call rakeness, accounting for amount measurements capture from signal acquired. Hence, localized a proper system tuning increases rakeness as well average SNR samples used in its reconstruction. Yet, maximizing go...
Matrix-Vector Multiplications (MVMs) represent a heavy workload for both training and inference in Deep Neural Networks (DNNs) applications. Analog In-memory Computing (AIMC) systems based on Phase Change Memory (PCM) has been shown to be valid competitor enhance the energy efficiency of DNN accelerators. Although DNNs are quite resilient computation inaccuracies, PCM non-idealities could strongly affect MVM operations precision, thus accuracy DNNs. In this paper, combined hardware software...
The classical estimation of co-channel interference in asynchronous direct sequence-code division multiple access (DS-CDMA) systems, obtained for a conventional receiver under the standard Gaussian approximation (SGA), is analytically minimised with respect to auto-correlation function spreading sequences. optimum found be real, alternating signs, and extremely closely follows an exponential trend. A family chaotic maps presented which able generate sequences signs. resulting DS-CDMA system...
The availability of multi-standard terminals will be key to provide location independent connections able take advantage any possible infrastructure. This paper addresses both the architecture and circuits for RF front-end a terminal with cellular (GSM, EDGE UMTS), LAN (IEEE802.11a/b/g) Bluetooth radio interfaces. A simulator has been developed validate architectural design choices in terms error rates at bit or packet level. takes into account implementation non-idealities performs all...
We here consider the most common technique used in spread spectrum clock generators that is frequency modulation of a timing signal by means triangularly shaped waveform. As first step, we develop reliable mathematical model analyzer, which allows us to compute power as measured this instrument for any put at its input. This particularly important when considering clocking methods electromagnetic interference reduction, since international regulations impose constraints on peak interfering...
Despite the linearity of its encoding, compressed sensing (CS) may be used to provide a limited form data protection when random encoding matrices are produce sets low-dimensional measurements (ciphertexts). In this paper, we quantify by theoretical means resistance least complex kind against known-plaintext attacks. For both standard CS with antipodal and recent multiclass encryption schemes based on it, show how number candidate that match typical plaintext-ciphertext pair is so large...
The paper aims to highlight relative strengths and weaknesses of some the recently proposed architectures for hardware implementation analog-to-information converters based on Compressive Sensing. To do so, most common are analyzed when saturation building blocks is taken into account, measurements subject quantization produce a digital stream. Furthermore, signal reconstruction performed by established novel algorithms (one linear programming other iterative guessing support target signal),...
Compressed Sensing (CS) can be introduced in the processing chain of a sensor node as mean to globally reduce its operating cost, while maximizing quality acquired signal. We exploit CS simple early-digital compression stage that performs multiplication signal by matrix. The costs (e.g., consumed power) such an encoding depend on number rows matrix, but also value and position rows' coefficients. Our novel design flow yields optimized sparse matrices with very few rows. It is non-trivial...
We present a new approach to design resonant dc-dc converters, that allows us achieve both more accurate implementation and simpler architecture, by reducing the number of required passive components. The is applied class-E topology, it based on analytic solution system differential equations regulating converter evolution. Our technique also capable taking into account most important circuit nonidealities. This represents an breakthrough with respect state art, where analysis strong...
Abstract Machine learning classifiers are increasingly used to inform, or even make, decisions significantly affecting human lives. Fairness concerns have spawned a number of contributions aimed at both identifying and addressing unfairness in algorithmic decision-making. This paper critically discusses the adoption group-parity criteria (e.g., demographic parity, equality opportunity, treatment equality) as fairness standards. To this end, we evaluate use machine methods relative different...
The growing interest in the Internet of Things (IoT) and mobile artificial intelligence applications is pushing investigation on deep neural networks (DNNs) that can operate at edge using low-resources/energy devices. To obtain such a goal, several pruning techniques have been proposed literature. They aim to reduce number interconnections-and consequently size, corresponding computing storage requirements-of DNNs traditionally rely classic multiply-and-accumulate (MAC) neurons. In this...