Salvatore Vitabile - Academia.edu (original) (raw)
Uploads
Papers by Salvatore Vitabile
Seventh International Workshop on Computer Architecture for Machine Perception (CAMP'05), 2005
Geometric object representation and their transformations are the two key aspects in computer gra... more Geometric object representation and their transformations are the two key aspects in computer graphics applications. Traditionally, compute-intensive matrix calculations are involved to model and render 3D scenery. Geometric algebra (a.k.a. Clifford algebra) is gaining growing attention for its natural way to model geometric facts coupled with its being a powerful analytical tool for symbolic calculations. In this paper, the architecture of CliffoSor (Clifford Processor) is introduced. ClifforSor is an embedded parallel coprocessing core that offers direct hardware support to Clifford algebra operators. A prototype implementation on an FPGA board is detailed. Initial test results show more than 4× speedup for Clifford products against the analogous operations in GAIGEN, a standard geometric algebra library generator for general purpose processors.
Biological and Artificial Intelligence Environments, 2005
... Salvatore Vitabile 1 , Giovanni Pilato 1 , Giorgio Vassallo 2 , SM Siniscalchi 2 ... function... more ... Salvatore Vitabile 1 , Giovanni Pilato 1 , Giorgio Vassallo 2 , SM Siniscalchi 2 ... functional form which describes some distribution [Beri et al., 2000], [Bhat and Bhat, 2000], or for event classification, combining information from different variables [Hays and Kotwal, 2002], [Tuttle et al ...
The new generation of wireless devices herald the development of products for integrated portable... more The new generation of wireless devices herald the development of products for integrated portable image and video communication requiring to image and video applications high computing performance. Portable MultiMedia Supercomputers (PMMS), a new class of architectures, allow to combine high computational performance, needed by multimedia applications, and a big energy efficiency, needed by portable devices. Among PMMS, the SIMPil (SIMD
Multi-agent systems expose users to risks related to lack of knowledge above interacting users. S... more Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an
Computer graphics applications require efficient tools to model geometric objects. The traditiona... more Computer graphics applications require efficient tools to model geometric objects. The traditional approach based on compute-intensive matrix calculations is error-prone due to a lack of integration between geometric reasoning and matrix-based algorithms. Clifford algebra offers a solution to these issues since it permits specification of geometry at a coordinate-free level. The best way to exploit the symbolic computing power of
... 4.1. FPGA fingerprint preprocessing 4.1.1. Normalization and binarization: represent the firs... more ... 4.1. FPGA fingerprint preprocessing 4.1.1. Normalization and binarization: represent the first two steps of pre-processing tasks. The normalization allows to the grey levels of original image (fig.2a) to converge around an average value with a desired variance (fig.2b). ...
Geometric or Clifford algebra is an interesting paradigm for geometric modeling in fields as comp... more Geometric or Clifford algebra is an interesting paradigm for geometric modeling in fields as computer graphics, machine vision and robotics. In these areas the research effort is actually aimed at finding an efficient implementation of geometric algebra. The best way to exploit the symbolic computing power of geometric algebra is to support its data types and operators directly in hardware.
Automatic vehicle driving involves several issues, such as the capability to follow the road and ... more Automatic vehicle driving involves several issues, such as the capability to follow the road and keep the right lane, to maintain the distance between vehicles, to regulate vehiclepsilas speed, to find the shortest route to a destination. In this paper a real-time automatic lane-keeper is proposed. The main features of the system are the lane markers location process as well
In this paper a novel embedded fingerprints authentication system based on core and delta singula... more In this paper a novel embedded fingerprints authentication system based on core and delta singularity points detection is proposed. Typical fingerprint recognition systems use core and delta singularity points for classification tasks. On the other hand, the available optical and photoelectric sensors give high quality fingerprint images with well defined core and delta points, if they are present. In the
ABSTRACT The main objective of this work is the comparison between metabolic networks and neural ... more ABSTRACT The main objective of this work is the comparison between metabolic networks and neural networks (ANNs) in terms of their robustness and fault tolerance capabilities. In the context of metabolic networks errors are random removal of network nodes, while attacks are failures in the network caused intentionally. In the contest of neural networks errors are usually defined configurations of input submitted to the network that are affected by noise, while the failures are defined as the removal of some network neurons. This study have proven that ANNs are very robust networks, with respect to the presence of noise in the inputs, and the partial removal of some nodes, until it reached a critical threshold; while, metabolic networks are very tolerant to random failures (absence of a critical threshold), but extremely vulnerable to targeted attacks.
... biometric system consists in the following phases: acquisition, segmentation, normalization, ... more ... biometric system consists in the following phases: acquisition, segmentation, normalization, features extraction and ... characteristics extraction to create a recognition system like the fingerprint minutiae-based ... that highlight the elaboration phases performed on the image (Figure 3 ...
Biometric recognition systems represent a valid solution to the safety problem of Internet access... more Biometric recognition systems represent a valid solution to the safety problem of Internet accessibility, even if they do not always provide an environment easily comprehensible by users and operators with a mid-level of competence. This gap can be partially filled if, instead of using the conventional access routines to the authentication system, the user could simply write to the system through the interface and using high level sentences and requests be able to use its own natural language to reach the intended goal. On the other hand, biometrics features are widely used for recognition and identification all over the world, generating large databases.In this paper a user-friendly interface for the use and management of biometric recognition systems is proposed. The interface allows for a simpler and more natural access to the functionalities offered by biometric systems, increasing system usability. The interface allows for an intuitive parameterization of functions and procedures of system algorithms, for the optimized management of great databases by unspecialized operators. In addition, the interface addresses the fail-to-enrol issue, because the quality of the acquired fingerprint is computed at the acquisition time.
... fingerprint image pre-processing phase; minutiae extraction phase; matching phase. 3.1.1.... more ... fingerprint image pre-processing phase; minutiae extraction phase; matching phase. 3.1.1.Fingerprint preprocessing phase This phase aims to reduce authentication faults in ... The most used pre-processing steps are: normalization and segmentation, directional image ...
Complex Intelligent Systems and Their Applications, 2010
One of the most recent and interesting applications of human–computer interaction technologies is... more One of the most recent and interesting applications of human–computer interaction technologies is the provision of advanced information services within public places, such as cultural heritage sites or schools and university campuses. In such contexts, concurrent technologies used in smart mobile devices can be used to satisfy the mobility need of users allowing them to access relevant resources in a
Seventh International Workshop on Computer Architecture for Machine Perception (CAMP'05), 2005
Geometric object representation and their transformations are the two key aspects in computer gra... more Geometric object representation and their transformations are the two key aspects in computer graphics applications. Traditionally, compute-intensive matrix calculations are involved to model and render 3D scenery. Geometric algebra (a.k.a. Clifford algebra) is gaining growing attention for its natural way to model geometric facts coupled with its being a powerful analytical tool for symbolic calculations. In this paper, the architecture of CliffoSor (Clifford Processor) is introduced. ClifforSor is an embedded parallel coprocessing core that offers direct hardware support to Clifford algebra operators. A prototype implementation on an FPGA board is detailed. Initial test results show more than 4× speedup for Clifford products against the analogous operations in GAIGEN, a standard geometric algebra library generator for general purpose processors.
Biological and Artificial Intelligence Environments, 2005
... Salvatore Vitabile 1 , Giovanni Pilato 1 , Giorgio Vassallo 2 , SM Siniscalchi 2 ... function... more ... Salvatore Vitabile 1 , Giovanni Pilato 1 , Giorgio Vassallo 2 , SM Siniscalchi 2 ... functional form which describes some distribution [Beri et al., 2000], [Bhat and Bhat, 2000], or for event classification, combining information from different variables [Hays and Kotwal, 2002], [Tuttle et al ...
The new generation of wireless devices herald the development of products for integrated portable... more The new generation of wireless devices herald the development of products for integrated portable image and video communication requiring to image and video applications high computing performance. Portable MultiMedia Supercomputers (PMMS), a new class of architectures, allow to combine high computational performance, needed by multimedia applications, and a big energy efficiency, needed by portable devices. Among PMMS, the SIMPil (SIMD
Multi-agent systems expose users to risks related to lack of knowledge above interacting users. S... more Multi-agent systems expose users to risks related to lack of knowledge above interacting users. Such systems should provide tools to protect their own resources from illegal accesses by unauthorized users. This paper describes a security framework for multi-agent systems preventing a trusted agent to interact with malicious agents and granting agent and platform resources. This feature is obtained adding an
Computer graphics applications require efficient tools to model geometric objects. The traditiona... more Computer graphics applications require efficient tools to model geometric objects. The traditional approach based on compute-intensive matrix calculations is error-prone due to a lack of integration between geometric reasoning and matrix-based algorithms. Clifford algebra offers a solution to these issues since it permits specification of geometry at a coordinate-free level. The best way to exploit the symbolic computing power of
... 4.1. FPGA fingerprint preprocessing 4.1.1. Normalization and binarization: represent the firs... more ... 4.1. FPGA fingerprint preprocessing 4.1.1. Normalization and binarization: represent the first two steps of pre-processing tasks. The normalization allows to the grey levels of original image (fig.2a) to converge around an average value with a desired variance (fig.2b). ...
Geometric or Clifford algebra is an interesting paradigm for geometric modeling in fields as comp... more Geometric or Clifford algebra is an interesting paradigm for geometric modeling in fields as computer graphics, machine vision and robotics. In these areas the research effort is actually aimed at finding an efficient implementation of geometric algebra. The best way to exploit the symbolic computing power of geometric algebra is to support its data types and operators directly in hardware.
Automatic vehicle driving involves several issues, such as the capability to follow the road and ... more Automatic vehicle driving involves several issues, such as the capability to follow the road and keep the right lane, to maintain the distance between vehicles, to regulate vehiclepsilas speed, to find the shortest route to a destination. In this paper a real-time automatic lane-keeper is proposed. The main features of the system are the lane markers location process as well
In this paper a novel embedded fingerprints authentication system based on core and delta singula... more In this paper a novel embedded fingerprints authentication system based on core and delta singularity points detection is proposed. Typical fingerprint recognition systems use core and delta singularity points for classification tasks. On the other hand, the available optical and photoelectric sensors give high quality fingerprint images with well defined core and delta points, if they are present. In the
ABSTRACT The main objective of this work is the comparison between metabolic networks and neural ... more ABSTRACT The main objective of this work is the comparison between metabolic networks and neural networks (ANNs) in terms of their robustness and fault tolerance capabilities. In the context of metabolic networks errors are random removal of network nodes, while attacks are failures in the network caused intentionally. In the contest of neural networks errors are usually defined configurations of input submitted to the network that are affected by noise, while the failures are defined as the removal of some network neurons. This study have proven that ANNs are very robust networks, with respect to the presence of noise in the inputs, and the partial removal of some nodes, until it reached a critical threshold; while, metabolic networks are very tolerant to random failures (absence of a critical threshold), but extremely vulnerable to targeted attacks.
... biometric system consists in the following phases: acquisition, segmentation, normalization, ... more ... biometric system consists in the following phases: acquisition, segmentation, normalization, features extraction and ... characteristics extraction to create a recognition system like the fingerprint minutiae-based ... that highlight the elaboration phases performed on the image (Figure 3 ...
Biometric recognition systems represent a valid solution to the safety problem of Internet access... more Biometric recognition systems represent a valid solution to the safety problem of Internet accessibility, even if they do not always provide an environment easily comprehensible by users and operators with a mid-level of competence. This gap can be partially filled if, instead of using the conventional access routines to the authentication system, the user could simply write to the system through the interface and using high level sentences and requests be able to use its own natural language to reach the intended goal. On the other hand, biometrics features are widely used for recognition and identification all over the world, generating large databases.In this paper a user-friendly interface for the use and management of biometric recognition systems is proposed. The interface allows for a simpler and more natural access to the functionalities offered by biometric systems, increasing system usability. The interface allows for an intuitive parameterization of functions and procedures of system algorithms, for the optimized management of great databases by unspecialized operators. In addition, the interface addresses the fail-to-enrol issue, because the quality of the acquired fingerprint is computed at the acquisition time.
... fingerprint image pre-processing phase; minutiae extraction phase; matching phase. 3.1.1.... more ... fingerprint image pre-processing phase; minutiae extraction phase; matching phase. 3.1.1.Fingerprint preprocessing phase This phase aims to reduce authentication faults in ... The most used pre-processing steps are: normalization and segmentation, directional image ...
Complex Intelligent Systems and Their Applications, 2010
One of the most recent and interesting applications of human–computer interaction technologies is... more One of the most recent and interesting applications of human–computer interaction technologies is the provision of advanced information services within public places, such as cultural heritage sites or schools and university campuses. In such contexts, concurrent technologies used in smart mobile devices can be used to satisfy the mobility need of users allowing them to access relevant resources in a