Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2015

STUDY OF THE PORTUGUESE POPULATIONS OF POWDERY MILDEW FUNGUS FROM DIVERSE GRAPEVINE CULTIVARS (VITIS VINIFERA)

Authors
Oliveira, M; Cunha, M;

Publication
JOURNAL INTERNATIONAL DES SCIENCES DE LA VIGNE ET DU VIN

Abstract
Aims: The main goal of this work was to describe the genetic diversity and population structure of Portuguese isolates from Erysiphe necator using a new approach for the sampling of DNA from this pathogen. Methods and results: The present study was conducted in the main demarcated wine regions of Portugal, where leaf and berry samples were collected for further genetic analysis. After DNA extraction, the Internal Transcribed Spacer from the 18S ribosomal RNA (ITS), the Intergenic Spacer (IGS), and the beta-tubulin gene were successfully amplified and sequenced. The populations of E. necator are structured into two genetically distinct groups (A and B), with the majority of the analyzed samples belonging to group B. Conclusion: Regardless of its geographical origin and the Vitis vinifera cultivar, the population of E. necator presents low genetic diversity. Significance and impact of the study: The present work will certainly help to increase the vineyard productivity through a better definition of preventive measures and a potential decrease in the direct and indirect costs associated with the use of fungicides.

2015

Customer segmentation in a large database of an online customized fashion business

Authors
Brito, PQ; Soares, C; Almeida, S; Monte, A; Byvoet, M;

Publication
ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING

Abstract
Data mining (DM) techniques have been used to solve marketing and manufacturing problems in the fashion industry. These approaches are expected to be particularly important for highly customized industries because the diversity of products sold makes it harder to find clear patterns of customer preferences. The goal of this project was to investigate two different data mining approaches for customer segmentation: clustering and subgroup discovery. The models obtained produced six market segments and 49 rules that allowed a better understanding of customer preferences in a highly customized fashion manufacturer/e-tailor. The scope and limitations of these clustering DM techniques will lead to further methodological refinements.

2015

Generalized Extraction of Real-Time Parameters for Homogeneous Synchronous Dataflow Graphs

Authors
Ali, HI; Akesson, B; Pinho, LM;

Publication
23RD EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2015)

Abstract
Many embedded multi-core systems incorporate both dataflow applications with timing constraints and traditional real-time applications. Applying real-time scheduling techniques on such systems provides real-time guarantees that all running applications will execute safely without violating their deadlines. However, to apply traditional real-time scheduling techniques on such mixed systems, a unified model to represent both types of applications running on the system is required. Several earlier works have addressed this problem and solutions have been proposed that address acyclic graphs, implicit-deadline models or are able to extract timing parameters considering specific scheduling algorithms. In this paper, we present an algorithm for extracting real-time parameters (offsets, deadlines and periods) that are independent of the schedulability analysis, other applications running in the system, and the specific platform. The proposed algorithm: 1) enables applying traditional real-time schedulers and analysis techniques on cyclic or acyclic Homogeneous Synchronous Dataflow (HSDF) applications with periodic sources, 2) captures overlapping iterations, which is a main characteristic of the execution of dataflow applications, 3) provides a method to assign offsets and individual deadlines for HSDF actors, and 4) is compatible with widely used deadline assignment techniques, such as NORM and PURE. The paper proves the correctness of the proposed algorithm through formal proofs and examples.

2015

SenseMyHeart: A Cloud Service and API for Wearable Heart Monitors

Authors
Pinto Silva, PMP; Silva Cunha, JPS;

Publication
2015 37TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC)

Abstract
In the era of ubiquitous computing, the growing adoption of wearable systems and body sensor networks is trailing the path for new research and software for cardiovascular intensity, energy expenditure and stress and fatigue detection through cardiovascular monitoring. Several systems have received clinical-certification and provide huge amounts of reliable heart-related data in a continuous basis. PhysioNet provides equally reliable open-source software tools for ECG processing and analysis that can be combined with these devices. However, this software remains difficult to use in a mobile environment and for researchers unfamiliar with Linux-based systems. In the present paper we present an approach that aims at tackling these limitations by developing a cloud service that provides an API for a PhysioNet-based pipeline for ECG processing and Heart Rate Variability measurement. We describe the proposed solution, along with its advantages and tradeoffs. We also present some client tools (windows and Android) and several projects where the developed cloud service has been used successfully as a standard for Heart Rate and Heart Rate Variability studies in different scenarios.

2015

Allocation of Parallel Real-Time Tasks in Distributed Multi-core Architectures supported by an FTT-SE Network

Authors
Martínez, Ricardo Garibay; Nelissen, Geoffrey; Ferreira, Luís Lino; Pinho, Luís Miguel;

Publication

Abstract
Distributed real-time systems such as automotive applications are becoming larger and more complex, thus, requiring the use of more powerful hardware and software architectures. Furthermore, those distributed applications commonly have stringent real-time constraints. This implies that such applications would gain in flexibility if they were parallelized and distributed over the system. In this paper, we consider the problem of allocating fixed-priority fork-join Parallel/Distributed real-time tasks onto distributed multi-core nodes connected through a Flexible Time Triggered Switched Ethernet network. We analyze the system requirements and present a set of formulations based on a constraint programming approach. Constraint programming allows us to express the relations between variables in the form of constraints. Our approach is guaranteed to find a feasible solution, if one exists, in contrast to other approaches based on heuristics. Furthermore, approaches based on constraint programming have shown to obtain solutions for these type of formulations in reasonable time.

2015

Logic-based schedulability analysis for compositional hard real-time embedded systems

Authors
Matos Pedro, Ad; Pereira, D; Pinho, LM; Pinto, JS;

Publication
SIGBED Review

Abstract
Over the past decades several approaches for schedu- lability analysis have been proposed for both uniprocessor and multi-processor real-time systems. Although different techniques are employed, very little has been put forward in using formal specifications, with the consequent possibility for misinterpretations or ambiguities in the problem statement. Using a logic based approach to schedulability analysis in the design of hard real-time systems eases the synthesis of correct-by- construction procedures for both static and dynamic verification processes. In this paper we propose a novel approach to schedulability analysis based on a timed temporal logic with time durations. Our approach subsumes classical methods for uniprocessor scheduling analysis over compositional resource models by providing the developer with counter-examples, and by ruling out schedules that cause unsafe violations on the system. We also provide an example showing the effectiveness of our proposal.

  • 2454
  • 4186