Inverting the Fundamental Diagram and Forecasting Boundary Conditions: How Machine Learning Can Improve Macroscopic Models for Traffic Flow

In this paper, we aim at developing new methods to join machine learning techniques and macroscopic differential models for vehicular traffic estimation and forecast. It is well known that data-driven and model- driven approaches have (sometimes complementary) advantages and drawbacks. We consider here a dataset with flux and velocity data of vehicles moving on a highway, collected by fixed sensors and classified by lane and by class of vehicle.

Segment Routing v6 - Security Issues and Experimental Results

SRv6 can provide hybrid cooperation between a centralized network controller and network nodes. IPv6 routers maintain multi-hop ECMP-aware segments, whereas the controller establishes a source-routed path through the network. Since the state of the flow is defined at the ingress to the network and then is contained in a specific packet header, called Segment Routing Header (SRH), the importance of such a header itself is vital. Motivated by the need to study and investigate this technology, this paper discusses some security-related issues of Segment Routing.

Some Results on Colored Network Contraction

Networks are pervasive in computer science and in real world applications. It is often useful to leverage distinctive node features to regroup such data in clusters, by making use of a single representative node per cluster. Such contracted graphs can help identify features of the original networks that were not visible before. As an example, we can identify contiguous nodes having the same discrete property in a social network. Contracting a graph allows a more scalable analysis of the interactions and structure of the network nodes.

A technical characterization of APTs by leveraging public resources

Advanced persistent threats (APTs) have rocketed over the last years. Unfortunately, their technical characterization is incomplete--it is still unclear if they are advanced usages of regular malware or a different form of malware. This is key to develop an effective cyberdefense. To address this issue, in this paper we analyze the techniques and tactics at stake for both regular and APT-linked malware. To enable reproducibility, our approach leverages only publicly available datasets and analysis tools. Our study involves 11,651 regular malware and 4686 APT-linked ones.

Exploiting the Abstract Calculus Pattern for the Integration of Ordinary Differential Equations for Dynamics Systems: An Object-Oriented Programming Approach in Modern Fortran

This manuscript relates to the exploiting of the abstract calculus pattern (ACP) for the (numerical) solution of ordinary differential equation (ODEs) systems, which are ubiquitous mathematical formulations of many physical (dynamical) phenomena. We present FOODIE, a software suite aimed to numerically solve ODE problems by means of a clear, concise, and efficient abstract interface.

jewel: a novel method for joint node-wise estimation of multiple Gaussian graphical models

Graphical models are well-known mathematical objects for describing conditional dependency relationships between random variables of a complex system. Gaussian graphical models refer to the case of multivariate Gaussian variable for which the graphical model is encoded through the support of corresponding inverse covariance (precision) matrix. We consider a problem of estimating multiple Gaussian graphical models from high- dimensional data sets under the assumption that they share the same conditional independence structure. However, the individual correlation matrices can differ.

Predictive Maintenance of Pins in the ECD Equipment for Cu Deposition in the Semiconductor Industry

Nowadays, Predictive Maintenance is a mandatory tool to reduce the cost of production in the semiconductor industry. This paper considers as a case study a critical part of the electrochemical deposition system, namely, the four Pins that hold a wafer inside a chamber. The aim of the study is to replace the schedule of replacement of Pins presently based on fixed timing (Preventive Maintenance) with a Hardware/Software system that monitors the conditions of the Pins and signals possible conditions of failure (Predictive Maintenance).

Comparison of the IASI water deficit index and other vegetation indices: the case study of the intense 2022 drought over the Po Valley

Exploiting the Infrared Atmospheric Sounder Interferometer (IASI) profiling capability for surface parameters, atmospheric temperature, and water vapour we have designed a new Water Deficit Index (wdi) to monitor drought and heatwaves. Because of climate change at a global level, drought is becoming a strong emergency also in countries which never experienced it, such as the Mediterranean mid-latitude area and, in particular, Italy. The last two years strongly affected the northern part of Italy, i.e. the Po Valley, causing high vegetation and soil water stress.