Nunzio Torrisi | Universidade Federal do ABC (original) (raw)
Papers by Nunzio Torrisi
Third Party Certification of Agri-Food Supply Chain Using Smart Contracts and Blockchain Tokens, 2021
Every consumer’s buying decision at the supermarket influences food brands to make first party cl... more Every consumer’s buying decision at the supermarket influences food brands to make first party claims of sustainability and socially responsible farming methods on their agro-product labels. Fine wines are often subject to counterfeit along the supply chain to the consumer. This paper presents a method for efficient unrestricted publicity to third party certification (TPC) of plant agricultural products, starting at harvest, using smart contracts and blockchain tokens. The method is capable of providing economic incentives to the actors along the supply chain. A proof-of-concept using a modified Ethereum IGR token set of smart contracts using the ERC-1155 standard NFTs was deployed on the Rinkeby test net and evaluated. The main findings include (a) allowing immediate access to TPC by the public for any desired authority by using token smart contracts. (b) Food safety can be enhanced through TPC visible to consumers through mobile application and blockchain technology, thus reducing counterfeiting and green washing. (c) The framework is structured and maintained because participants obtain economic incentives thus leveraging it´s practical usage. In summary, this implementation of TPC broadcasting through tokens can improve transparency and sustainable conscientious consumer behaviour, thus enabling a more trustworthy supply chain transparency. View Full-Text
Keywords: blockchain; agri-food; supply chain; third party certification; green-washing; Ethereum tokens; ERC-20; ERC-1155; distributed ledger technology; non fungible tokens
Informatics
The use of smart contracts and blockchain tokens to implement a consumer trustworthy ingredient c... more The use of smart contracts and blockchain tokens to implement a consumer trustworthy ingredient certification scheme for commingled foods, i.e., recipe based, food products is described. The proposed framework allows ingredients that carry any desired property (including social or environmental customer perceived value) to be certified by any certification authority, at the moment of harvest or extraction, using the IGR Ethereum token. The mechanism involves the transfer of tokens containing the internet url published at the authority’s web site from the farmer all along the supply chain to the final consumer at each transfer of custody of the ingredient using the Cricital Tracking Event/Key Data Elements (CTE/KDE) philosophy of the Institute of Food Technologists (IFT). This allows the end consumer to easily inspect and be assured of the origin of the ingredient by means of a mobile application. A successful code implementation of the framework was deployed, tested and is running a...
Big Data and Cognitive Computing
This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol... more This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol (DHCP) algorithm over multiple interconnected local networks. The proposed model is open and used as an alternative to commercial solutions for a multi-campus institution with facilities in different regions that are interconnected point-to-point using a dedicated link. When the DHCP scope has to be managed and structured over multiple geographic locations that are VPN connected, it requires physical redundancy, which can be provided by a failover server. The proposed solution overcomes the limitation placed on the number of failover servers as defined in the DHCP failover (DHCP-F) protocol, which specifies the use of one primary and one secondary server. Moreover, the presented work also contributes to improving the DHCP-F specification relative to a number of practical workarounds, such as the use of a virtualized DHCP server. Therefore, this research assumes a recovery strategy that ...
Informatics
Deadband algorithms are implemented inside industrial gateways to reduce the volume of data sent ... more Deadband algorithms are implemented inside industrial gateways to reduce the volume of data sent across different networks. By tuning the deadband sampling resolution by a preset interval Δ , it is possible to estimate the balance between the traffic rates of networks connected by industrial SCADA gateways. This work describes the design and implementation of two original deadband algorithms based on statistical concepts derived by John Bollinger in his financial technical analysis. The statistical algorithms proposed do not require the setup of a preset interval—this is required by non-statistical algorithms. All algorithms were evaluated and compared by computing the effectiveness and fidelity over a public collection of random pseudo-periodic signals. The overall performance measured in the simulations showed better results, in terms of effectiveness and fidelity, for the statistical algorithms, while the measured computing resources were not as efficient as for the non-statistic...
Machine Learning and Knowledge Extraction
The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry an... more The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry and, consequently, in smart grids. The Peekaboo attack was created to compromise DNP3 traffic, in which a man-in-the-middle on a communication link can capture and drop selected encrypted DNP3 messages by using support vector machine learning algorithms. The communication networks of smart grids are a important part of their infrastructure, so it is of critical importance to keep this communication secure and reliable. The main contribution of this paper is to compare the use of machine learning techniques to classify messages of the same protocol exchanged in encrypted tunnels. The study considers four simulated cases of encrypted DNP3 traffic scenarios and four different supervised machine learning algorithms: Decision tree, nearest-neighbor, support vector machine, and naive Bayes. The results obtained show that it is possible to extend a Peekaboo attack over multiple substations, using...
Advances in Intelligent Systems and Computing, 2016
2014 Ieee International Conference on Smart Grid Communications, Nov 1, 2014
2014 11th IEEE/IAS International Conference on Industry Applications, 2014
2008 34th Annual Conference of IEEE Industrial Electronics, 2008
This article presents a fieldbus simulation platform and its remote access interface that enables... more This article presents a fieldbus simulation platform and its remote access interface that enables a wide range of experiments where users can configure operation sequences and procedures typical of Foundation Fieldbus systems. The simulation system is developed using LabVIEW with requisites of deterministic execution and a course management work frame web server called Moodle. The evaluation tests were conducted to
The use of laboratories at Engineering Schools is a common practice and intends to complement the... more The use of laboratories at Engineering Schools is a common practice and intends to complement the lessons presented in the classrooms. Simulators are commonly used to facilitate students' access to those laboratories. Besides, due to the broad presence of the internet, the use of remote access has considerably helped that learning method. In this context, this article presents the remote access to a simulation platform which opens a wide range of experiments where students can configure different sequences of practical exercises to embrace fundamental concepts of FOUNDATION Fieldbus control systems. The system is developed using a course management system called Moodle and LabVIEW, and it is evaluated through a pilot test where students access the tool and execute some predefined experiments.
Tuning of industrial systems is executed in the initial phase of the system and mainly during the... more Tuning of industrial systems is executed in the initial phase of the system and mainly during the maintenance phase, providing characteristics of the performance of the industrial process during production life cycle. Remote tuning supports several practical applications, such as specialized companies outsourcing services or companies distributed in different areas centralizing optimization. This paper proposes a software tool for remote tuning of open or closed PID control loops in an industrial environment that fulfils the requirements described above, in a single platform. The software tool could be used in control loops tuning in industrial systems, as well as in an academic environment simulating control applications and industrial networks.
2009 7th IEEE International Conference on Industrial Informatics, 2009
ABSTRACT During the setup phase of an industrial plant and mainly during the maintenance phase, t... more ABSTRACT During the setup phase of an industrial plant and mainly during the maintenance phase, the tuning of industrial systems is executed. It enhances the performance of the industrial process during production life cycle. This paper focus on remote tuning applications and issues. The remote tuning approach supports several practical applications, such as specialized companies outsourcing services or companies distributed in different areas centralizing optimization. The developed software tool for remote tuning of open or closed PID control loops in an industrial environment fulfils the requirements described above, in a single platform. The transport technology CyberOPC supports the remote data update rate required using open technologies. The software tool could be used in control loops tuning in industrial systems, as well as in an academic environment simulating control applications and industrial networks.
2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2014
2008 IEEE International Workshop on Factory Communication Systems, 2008
This work describes an application and a case study of the Open-EDD technology to the supervision... more This work describes an application and a case study of the Open-EDD technology to the supervision of a FOUNDATION Fieldbus simulation tool, based on the FBSIMU tool. The Open-EDD technology was developed base on software standards already spread for personal computers (XLST, Xerces-DOM implementation, OO, XML Schema) and it is applied in this paper as viable alternative to the currently standardized Device Description technology (IEC 61804-2-EDD) used for the HART, PROFIBUS and FOUNDATION Fieldbus protocols. In the case of FOUNDATION Fieldbus protocol, for the integration of IEC 61804-2 EDD with FBSIMU, it is necessary to purchase an integration toolkit, that has a high cost. The fieldbus simulation is based on the FBSIMU tool that focuses on the application process of Foundation Fieldbus systems and provides all functionalities to the user considering the configuration and operation of a fieldbus strategy. The results comprehend a functional and temporal evaluation that proves the possibility to reach fieldbus interoperability with the use of truly open software standards.
Resumo⎯ Durante os últimos anos, a evolução das redes fieldbus, em conjunto com a simplificação d... more Resumo⎯ Durante os últimos anos, a evolução das redes fieldbus, em conjunto com a simplificação das redes tradicionais de computadores, permitiu a integração de diferentes sistemas de comunicação tanto dentro das células de produção, quanto entre células de produção e outros sistemas para gerência inteligente, supervisão e controle. Várias tecnologias de comunicação já existem atualmente para redes públicas e não-públicas
Neural Computing and Applications, 2013
Traceability in food chains will be mandatory in the near future for the most companies intereste... more Traceability in food chains will be mandatory in the near future for the most companies interested in food processing. Every food chain is made up of a variable number of companies. To realize a full traceability system we propose a distributed collaborative information system where every company exchanges traceability data with the others over a network. XML was used as
13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004
Traceability in food chains is mandatory in the near future for the most companies interested in ... more Traceability in food chains is mandatory in the near future for the most companies interested in food processing. Every food chain is made up of a variable number of companies. To realize a full traceability system we propose a distributed collaborative information system where every company exchanges traceability data with the others over a network. XML was used as the
29th Annual IEEE International Conference on Local Computer Networks, 2004
The master/slave time division duplex approach implemented in the Bluetooth MAC sublayer simplifi... more The master/slave time division duplex approach implemented in the Bluetooth MAC sublayer simplifies management of the physical communication channel, but suffers from some limitations which prevent efficient bandwidth exploitation and may affect the overall throughput and message delays. These limitation have up to now prevented Bluetooth being extensively and successfully used in areas which differ from the traditional target applications
2007 5th IEEE International Conference on Industrial Informatics, 2007
... These efforts to design a simple HTTP and XML based architecture will keep the Open-EDD servi... more ... These efforts to design a simple HTTP and XML based architecture will keep the Open-EDD services in order to offer a simple and low cost alternative for theintegration of heterogeneous industrial devices over IP networks. ...
Third Party Certification of Agri-Food Supply Chain Using Smart Contracts and Blockchain Tokens, 2021
Every consumer’s buying decision at the supermarket influences food brands to make first party cl... more Every consumer’s buying decision at the supermarket influences food brands to make first party claims of sustainability and socially responsible farming methods on their agro-product labels. Fine wines are often subject to counterfeit along the supply chain to the consumer. This paper presents a method for efficient unrestricted publicity to third party certification (TPC) of plant agricultural products, starting at harvest, using smart contracts and blockchain tokens. The method is capable of providing economic incentives to the actors along the supply chain. A proof-of-concept using a modified Ethereum IGR token set of smart contracts using the ERC-1155 standard NFTs was deployed on the Rinkeby test net and evaluated. The main findings include (a) allowing immediate access to TPC by the public for any desired authority by using token smart contracts. (b) Food safety can be enhanced through TPC visible to consumers through mobile application and blockchain technology, thus reducing counterfeiting and green washing. (c) The framework is structured and maintained because participants obtain economic incentives thus leveraging it´s practical usage. In summary, this implementation of TPC broadcasting through tokens can improve transparency and sustainable conscientious consumer behaviour, thus enabling a more trustworthy supply chain transparency. View Full-Text
Keywords: blockchain; agri-food; supply chain; third party certification; green-washing; Ethereum tokens; ERC-20; ERC-1155; distributed ledger technology; non fungible tokens
Informatics
The use of smart contracts and blockchain tokens to implement a consumer trustworthy ingredient c... more The use of smart contracts and blockchain tokens to implement a consumer trustworthy ingredient certification scheme for commingled foods, i.e., recipe based, food products is described. The proposed framework allows ingredients that carry any desired property (including social or environmental customer perceived value) to be certified by any certification authority, at the moment of harvest or extraction, using the IGR Ethereum token. The mechanism involves the transfer of tokens containing the internet url published at the authority’s web site from the farmer all along the supply chain to the final consumer at each transfer of custody of the ingredient using the Cricital Tracking Event/Key Data Elements (CTE/KDE) philosophy of the Institute of Food Technologists (IFT). This allows the end consumer to easily inspect and be assured of the origin of the ingredient by means of a mobile application. A successful code implementation of the framework was deployed, tested and is running a...
Big Data and Cognitive Computing
This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol... more This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol (DHCP) algorithm over multiple interconnected local networks. The proposed model is open and used as an alternative to commercial solutions for a multi-campus institution with facilities in different regions that are interconnected point-to-point using a dedicated link. When the DHCP scope has to be managed and structured over multiple geographic locations that are VPN connected, it requires physical redundancy, which can be provided by a failover server. The proposed solution overcomes the limitation placed on the number of failover servers as defined in the DHCP failover (DHCP-F) protocol, which specifies the use of one primary and one secondary server. Moreover, the presented work also contributes to improving the DHCP-F specification relative to a number of practical workarounds, such as the use of a virtualized DHCP server. Therefore, this research assumes a recovery strategy that ...
Informatics
Deadband algorithms are implemented inside industrial gateways to reduce the volume of data sent ... more Deadband algorithms are implemented inside industrial gateways to reduce the volume of data sent across different networks. By tuning the deadband sampling resolution by a preset interval Δ , it is possible to estimate the balance between the traffic rates of networks connected by industrial SCADA gateways. This work describes the design and implementation of two original deadband algorithms based on statistical concepts derived by John Bollinger in his financial technical analysis. The statistical algorithms proposed do not require the setup of a preset interval—this is required by non-statistical algorithms. All algorithms were evaluated and compared by computing the effectiveness and fidelity over a public collection of random pseudo-periodic signals. The overall performance measured in the simulations showed better results, in terms of effectiveness and fidelity, for the statistical algorithms, while the measured computing resources were not as efficient as for the non-statistic...
Machine Learning and Knowledge Extraction
The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry an... more The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry and, consequently, in smart grids. The Peekaboo attack was created to compromise DNP3 traffic, in which a man-in-the-middle on a communication link can capture and drop selected encrypted DNP3 messages by using support vector machine learning algorithms. The communication networks of smart grids are a important part of their infrastructure, so it is of critical importance to keep this communication secure and reliable. The main contribution of this paper is to compare the use of machine learning techniques to classify messages of the same protocol exchanged in encrypted tunnels. The study considers four simulated cases of encrypted DNP3 traffic scenarios and four different supervised machine learning algorithms: Decision tree, nearest-neighbor, support vector machine, and naive Bayes. The results obtained show that it is possible to extend a Peekaboo attack over multiple substations, using...
Advances in Intelligent Systems and Computing, 2016
2014 Ieee International Conference on Smart Grid Communications, Nov 1, 2014
2014 11th IEEE/IAS International Conference on Industry Applications, 2014
2008 34th Annual Conference of IEEE Industrial Electronics, 2008
This article presents a fieldbus simulation platform and its remote access interface that enables... more This article presents a fieldbus simulation platform and its remote access interface that enables a wide range of experiments where users can configure operation sequences and procedures typical of Foundation Fieldbus systems. The simulation system is developed using LabVIEW with requisites of deterministic execution and a course management work frame web server called Moodle. The evaluation tests were conducted to
The use of laboratories at Engineering Schools is a common practice and intends to complement the... more The use of laboratories at Engineering Schools is a common practice and intends to complement the lessons presented in the classrooms. Simulators are commonly used to facilitate students' access to those laboratories. Besides, due to the broad presence of the internet, the use of remote access has considerably helped that learning method. In this context, this article presents the remote access to a simulation platform which opens a wide range of experiments where students can configure different sequences of practical exercises to embrace fundamental concepts of FOUNDATION Fieldbus control systems. The system is developed using a course management system called Moodle and LabVIEW, and it is evaluated through a pilot test where students access the tool and execute some predefined experiments.
Tuning of industrial systems is executed in the initial phase of the system and mainly during the... more Tuning of industrial systems is executed in the initial phase of the system and mainly during the maintenance phase, providing characteristics of the performance of the industrial process during production life cycle. Remote tuning supports several practical applications, such as specialized companies outsourcing services or companies distributed in different areas centralizing optimization. This paper proposes a software tool for remote tuning of open or closed PID control loops in an industrial environment that fulfils the requirements described above, in a single platform. The software tool could be used in control loops tuning in industrial systems, as well as in an academic environment simulating control applications and industrial networks.
2009 7th IEEE International Conference on Industrial Informatics, 2009
ABSTRACT During the setup phase of an industrial plant and mainly during the maintenance phase, t... more ABSTRACT During the setup phase of an industrial plant and mainly during the maintenance phase, the tuning of industrial systems is executed. It enhances the performance of the industrial process during production life cycle. This paper focus on remote tuning applications and issues. The remote tuning approach supports several practical applications, such as specialized companies outsourcing services or companies distributed in different areas centralizing optimization. The developed software tool for remote tuning of open or closed PID control loops in an industrial environment fulfils the requirements described above, in a single platform. The transport technology CyberOPC supports the remote data update rate required using open technologies. The software tool could be used in control loops tuning in industrial systems, as well as in an academic environment simulating control applications and industrial networks.
2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2014
2008 IEEE International Workshop on Factory Communication Systems, 2008
This work describes an application and a case study of the Open-EDD technology to the supervision... more This work describes an application and a case study of the Open-EDD technology to the supervision of a FOUNDATION Fieldbus simulation tool, based on the FBSIMU tool. The Open-EDD technology was developed base on software standards already spread for personal computers (XLST, Xerces-DOM implementation, OO, XML Schema) and it is applied in this paper as viable alternative to the currently standardized Device Description technology (IEC 61804-2-EDD) used for the HART, PROFIBUS and FOUNDATION Fieldbus protocols. In the case of FOUNDATION Fieldbus protocol, for the integration of IEC 61804-2 EDD with FBSIMU, it is necessary to purchase an integration toolkit, that has a high cost. The fieldbus simulation is based on the FBSIMU tool that focuses on the application process of Foundation Fieldbus systems and provides all functionalities to the user considering the configuration and operation of a fieldbus strategy. The results comprehend a functional and temporal evaluation that proves the possibility to reach fieldbus interoperability with the use of truly open software standards.
Resumo⎯ Durante os últimos anos, a evolução das redes fieldbus, em conjunto com a simplificação d... more Resumo⎯ Durante os últimos anos, a evolução das redes fieldbus, em conjunto com a simplificação das redes tradicionais de computadores, permitiu a integração de diferentes sistemas de comunicação tanto dentro das células de produção, quanto entre células de produção e outros sistemas para gerência inteligente, supervisão e controle. Várias tecnologias de comunicação já existem atualmente para redes públicas e não-públicas
Neural Computing and Applications, 2013
Traceability in food chains will be mandatory in the near future for the most companies intereste... more Traceability in food chains will be mandatory in the near future for the most companies interested in food processing. Every food chain is made up of a variable number of companies. To realize a full traceability system we propose a distributed collaborative information system where every company exchanges traceability data with the others over a network. XML was used as
13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004
Traceability in food chains is mandatory in the near future for the most companies interested in ... more Traceability in food chains is mandatory in the near future for the most companies interested in food processing. Every food chain is made up of a variable number of companies. To realize a full traceability system we propose a distributed collaborative information system where every company exchanges traceability data with the others over a network. XML was used as the
29th Annual IEEE International Conference on Local Computer Networks, 2004
The master/slave time division duplex approach implemented in the Bluetooth MAC sublayer simplifi... more The master/slave time division duplex approach implemented in the Bluetooth MAC sublayer simplifies management of the physical communication channel, but suffers from some limitations which prevent efficient bandwidth exploitation and may affect the overall throughput and message delays. These limitation have up to now prevented Bluetooth being extensively and successfully used in areas which differ from the traditional target applications
2007 5th IEEE International Conference on Industrial Informatics, 2007
... These efforts to design a simple HTTP and XML based architecture will keep the Open-EDD servi... more ... These efforts to design a simple HTTP and XML based architecture will keep the Open-EDD services in order to offer a simple and low cost alternative for theintegration of heterogeneous industrial devices over IP networks. ...