Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2017

Single-phase AC-DC-AC multilevel converter for grid overvoltage based on an H-bridge connected in series to the five-leg converter

Authors
Queiroz, AdPD; Jacobina, CB; Maia, ACN; Melo, VFMB; de Freitas, NB; Carlos, GAdA;

Publication
2017 IEEE Energy Conversion Congress and Exposition (ECCE)

Abstract

2017

Performance trade-offs on a secure multi-party relational database

Authors
Pontes, R; Pinto, M; Barbosa, M; Vilaça, R; Matos, M; Oliveira, R;

Publication
Proceedings of the Symposium on Applied Computing, SAC 2017, Marrakech, Morocco, April 3-7, 2017

Abstract
The privacy of information is an increasing concern of software applications users. This concern was caused by attacks to cloud services over the last few years, that have leaked confidential information such as passwords, emails and even private pictures. Once the information is leaked, the users and software applications are powerless to contain the spread of information and its misuse. With databases as a central component of applications that store almost all of their data, they are one of the most common targets of attacks. However, typical deployments of databases do not leverage security mechanisms to stop attacks and do not apply cryptographic schemes to protect data. This issue has been tackled by multiple secure databases that provide trade-offs between security, query capabilities and performance. Despite providing stronger security guarantees, the proposed solutions still entrust their data to a single entity that can be corrupted or hacked. Secret sharing can solve this problem by dividing data in multiple secrets and storing each secret at a different location. The division is done in such a way that if one location is hacked, no information can be leaked. Depending on the protocols used to divide data, functions can be computed over this data through secure protocols that do not disclose information or actually know which values are being calculated. We propose a SQL database prototype capable of offering a trade-off between security and query latency by using a different secure protocol. An evaluation of the protocols is also performed, showing that our most relaxed protocol has an improvement of 5% on the query latency time over the original protocol. © 2017 ACM.

2017

Detection of juxta-pleural lung nodules in computed tomography images

Authors
Aresta, G; Cunha, A; Campilho, A;

Publication
Medical Imaging 2017: Computer-Aided Diagnosis, Orlando, Florida, United States, 11-16 February 2017

Abstract
A method to detect juxta-pleural nodules with radius smaller than 5mm is presented. The intensity difference between nodules and parenchymal tissue as well as the nodules' natural roundness are exploited. Solid nodules are detected by selecting an appropriate threshold over a sliding window, whereas sub-solid/non-solid nodules are enhanced using multi-scale Laplacian-of-Gaussian filters. The 2D-wise outputs are combined to 3D, producing a final candidate list. False positive reduction is achieved with fixed rules and supervised learning. The achieved sensitivity is 57% with 4 false positives/scan, increasing to 62% if only solid nodules are considered. © 2017 SPIE.

2017

Risk-Based Self-Scheduling of Gencos in Smart Grids considering a New Method for Bilateral Contracts

Authors
Shafie khah, M; Osorio, GJ; Fitiwi, DZ; Catalao, JPS; Siano, P;

Publication
2017 1ST IEEE INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING AND 2017 17TH IEEE INDUSTRIAL AND COMMERCIAL POWER SYSTEMS EUROPE (EEEIC / I&CPS EUROPE)

Abstract
In this work, the self-scheduling problem of a power producer in smart grids is addressed using a stochastic programming approach. Different uncertainties are considered as price uncertainties, forced-outage of the unit as well as generation reallocation. The conditional value-at-risk index is used for modeling of risk. The markets considered in this study are bilateral contracts, day-ahead and ancillary services, including spinning reserve and regulation, and spot market decisions, while an incomplete competitive market is considered. In this sense, an innovative method for bilateral contracts is proposed to increase the profit of the market without ignoring any regulatory rules. The Monte Carlo method is implemented together with a reduction scenario process to generate scenarios.

2017

A Textured Scale-based Approach to Melanocytic Skin Lesions in Dermoscopy

Authors
Fonseca Pinto, R; Machado, M;

Publication
2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO)

Abstract
Melanoma is the most dangerous and lethal form of human skin cancer and the early detection is a fundamental key for its successful management. In recent years the use of automatic classification algorithms in the context of Computer Aided Diagnosis (CAD) systems have been an important tool, by improving quantification metrics and also assisting in the decision regarding lesion management. This paper presents a novel and robust textured-based approach to detect melanomas among melanocytic images obtained by dermoscopy, using Local Binary Pattern Variance (LBPV) histograms after the Bidimensional Empirical Mode Decomposition (BEMD) scale-based decomposition methodology. The results show that it is possible to develop a robust CAD system for the classification of dermoscopy images obtained from different databases and acquired in diverse conditions. After the initial texture-scale based classification a post-processing refinement is proposed using reticular pattern and color achieving to 97.83, 94.44 and 96.00 for Sensitivity, Specificity and Accuracy.

2017

Formal Concept Analysis Applied to Professional Social Networks Analysis

Authors
Silva, PRC; Dias, SM; Brandão, WC; Song, MA; Zárate, LE;

Publication
Proceedings of the 19th International Conference on Enterprise Information Systems

Abstract

  • 1960
  • 4042