Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2019

Evaluation of Environmental Influences on a Multi-Point Optical Fiber Methane Leak Monitoring System

Authors
Floridia, C; Rosolem, JB; Fracarolli, JPV; Bassan, FR; Penze, RS; Pereira, LM; da Motta Resende, MAC;

Publication
Remote Sensing

Abstract
A novel system to monitor methane fugitive emissions was developed using passive optical sensors to attend to the natural gas production and transportation industry. The system is based on optical time domain reflectometry and direct optical absorption spectroscopy. The system was tested in a gas compressor station for four months. The system was capable to measure methane concentration at two points showing its correlation with meteorological data, specially wind velocity and local temperature. Methane concentrations varied from 2.5% to 15% in the first monitored point by sensor 1, and from 5% to 30%, in the second point with sensor 2. Both sensors exhibited a moderate negative correlation with wind velocity with a mean Pearson coefficient of -0.61, despite the external cap designed to avoid the influence of wind. Sensor 2 had a modification to its external package that reduced this mean correlation coefficient to -0.30, considered to be weak to negligible. Regarding temperature, a moderate mean correlation of -0.59 was verified for sensor 1 and zero mean correlation was found for sensor 2. Based on these results the system was proven to be robust for installation in gas transportation or processing facilities.

2019

Advancing the science of unfinished nursing care: Exploring the benefits of cross-disciplinary knowledge exchange, knowledge integration and transdisciplinarity

Authors
Jones, T; Willis, E; Amorim Lopes, M; Drach Zahavy, A;

Publication
JOURNAL OF ADVANCED NURSING

Abstract
Aims The aims of this paper are to explore the role of cross-disciplinary knowledge exchange and integration in advancing the science of unfinished nursing care and to offer preliminary guidance for theory development activities for this growing international community of scholars. Background Unfinished nursing care, also known as missed care or rationed care is a highly prevalent problem with negative consequences for patients, nurses and healthcare organizations around the world. It presents as a 'wicked' sustainability problem resulting from structural obstacles to effective resource allocation that have been resistant to conventional solutions. Research activity related to this problem is on the rise internationally but is hindered by inconsistencies in conceptualizations of the problem and lack of robust theory development around the phenomenon. A unified conceptual framework is needed to focus scholarly activities and facilitate advancement of a robust science of unfinished nursing care. Design Discussion paper. Data Sources This discussion paper is based on our own experiences in international and interdisciplinary research partnerships related to unfinished nursing care. These experiences are placed in the context of both classic and current literature related to the evolution of scientific knowledge. Implications for Nursing The problem of unfinished nursing care crosses multiple scientific disciplines. It is imperative that the community of scholars interested in solving this wicked problem engage in meaningful cross-disciplinary knowledge integration and move towards transdisciplinarity. Conclusion Metatheorizing guided by structuration theory should be considered as a strategy to promote transdiciplinarity around the problem of unfinished nursing care.

2019

IVY 2-A model-based analysis tool

Authors
Couto, R; Campos, JC;

Publication
PROCEEDINGS OF THE ACM SIGCHI SYMPOSIUM ON ENGINEERING INTERACTIVE COMPUTING SYSTEMS (EICS'19)

Abstract
The IVY workbench is a model-based tool that supports the formal verification of interactive computing systems. It adopts a plugin-based architecture to support a flexible development model. Over the years the chosen architectural solution revealed a number of limitations, resulting both from technological deprecation of some of the adopted solutions and a better understanding of the verification process to support. This paper presents the redesign and implementation of the original plugin infrastructure, originating a new version of the tool: IVY 2. It describes the limitations of the original solutions and the new architecture, which resorts to the Java module system in order to solve them.

2019

The Security Challenges Emerging from the Technological Developments A Practical Case Study of Organizational Awareness to the Security Risks

Authors
Costa, P; Montenegro, R; Pereira, T; Pinto, P;

Publication
MOBILE NETWORKS & APPLICATIONS

Abstract
An increase number of cyberattacks on public and private organizations have been performed by exploiting their social and technological vulnerabilities. Mainly, these attacks aim to obtain illegal profits by extorting organizations, affecting their reputation and normal operation. In order to minimize the impact of these attacks, it is essential that these organizations not only implement preventive actions and efficient security mechanisms, but also continually evaluate the security risks their staff are exposed to when performing their job tasks. This paper presents a case study to assess the private and public Portuguese organizations security related practices followed by their staff. The results obtained by a conducted survey allow the analysis of behaviours and practices followed by the staff of these organizations and also allow to draw conclusions about their security procedures and risk awareness.

2019

Subsidiary survival: a case study from the Portuguese electronics industry

Authors
Silva, P; Moreira, AC;

Publication
REVIEW OF INTERNATIONAL BUSINESS AND STRATEGY

Abstract
Purpose The existing literature suggests that multinational corporations (MNCs) divest subsidiary units whenever they cease to enjoy the advantages of ownership, location or internalization. However, not all MNCs divest under these conditions. This paper aims to explore the factors that contributed to the survival of a particular subsidiary and prevented it from being divested. Design/methodology/approach The analysis focuses on an individual subsidiary of a large foreign MNC in the electronics industry, which divested other subsidiaries from Portugal. Data were collected using semi-structured interviews. Findings The subsidiary's diverse customer base, specificity and high level of efficiency, the local advantages, the existing governmental agreements and the parent MNC's previous unsuccessful relocation experiences seem to have contributed to the survival of the subsidiary. Research limitations/implications - Although the results of the case study are not generalizable to the entire population of firms, the featured case study is a rare survival success story in the Portuguese electronics industry. Practical implications - The proposed framework may offer public authorities measures to create conditions to encourage firms to retain their investment in a particular site. For corporate strategists, new perspectives on subsidiary survival are provided. Originality/value This paper is one of the few qualitative studies in the field of subsidiary survival. The results offer an integrative framework on which factors contribute to the survival of a subsidiary located on a comparatively unfavorable labor cost location and support the role of the organizational learning and of previous failed relocation experiences and relocation barriers when a parent MNC decides whether to retain a unit.

2019

pTASC: Trustable Autonomous Secure Communications

Authors
Sousa, PR; Cirne, A; Resende, JS; Martins, R; Antunes, L;

Publication
ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING

Abstract
The number of devices connected to the Internet has been increasing exponentially. There is a substantial amount of data being exchanged among numerous connected devices. The added convenience brought by these devices spans across multiple facets of everyday life, such as drivers reporting an accident through dash cams, patients monitoring their own health, and companies controlling the safety of their facilities. However, it is critical to increase safety and privacy across the data generated and propagated by these devices. Previous works have focused mainly on device management and relied on centralized solutions namely Public Key Infrastructure (PKI). This paper describes a novel mechanism that ensures secure autonomous communication between Internet of Things (IoT) devices, while using a completely decentralized solution that mitigates the classical single points-of-failure problem. This is accomplished by a new peer-to-peer protocol using Short Authentication Strings (SAS), in which verification is made through a Limited-Location Channel (LLC).

  • 1517
  • 4201