2013
Authors
Soares, AL; Sousa, C; Pereira, C;
Publication
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2013 WORKSHOPS
Abstract
This paper describes an action-research approach to the specification of an ontology to be applied in the information organisation of a community of forest planning experts. Like many others, a community of forest planning experts does not see their technical domains in unison, rather it voices several points of view that need to be shared and understood. This research started by addressing the practical problem of achieving an effective information structure and organisation for a semantic wiki platform. This was supported by a method and platform for the collaborative specification of ontologies: conceptME. Simultaneously, an empirical study was carried out aiming at understanding better how a technical community pragmatically develops conceptual representations of a domain. The results of this research show the benefits of collaboration in the development of conceptual models for knowledge organisation and information retrieval.
2013
Authors
Tonelo, C; Moreira, AP; Veiga, G;
Publication
Healthcom
Abstract
The main objective of this project was to evaluate the sensing system for person detection in the scope of its integration in a mobile robotic platform for Ambient Assisted Living. Two sensors were considered, a camera and a depth sensor. For the camera (2D), 3 different algorithms were implemented: face detection, tracking and recognition. For the depth sensor the whole body detection was tested using skeleton tracking. The results showed that the face detection and recognition algorithms had a very small range, and the face tracking demonstrated to reach a higher distance. However, the latter exhibited poor results when confronted with illumination variations. The skeleton tracking algorithm provided good results, being capable of tracking relatively close to the sensor and up to 3 meters distance. Thus, the 2D face recognition can be used for short distances to identify the person, while the 3D skeleton tracking can be appropriated for distant tracking of the person. This work showed that the integration of these sensing systems, in a robotic platform, can make a robust robot capable of human interaction in home environments. © 2013 IEEE.
2013
Authors
Ara, M; Reboredo, H; Renna, F; Rodrigues, MRD;
Publication
2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
Abstract
This paper investigates power allocation strategies over a bank of independent parallel Gaussian wiretap channels where a legitimate transmitter and a legitimate receiver communicate in the presence of an eavesdropper and a friendly jammer. We give algorithms to compute the optimal power allocation strategy of the jammer in the degraded scenario. We also give an algorithm to compute power allocations strategies of the jammer in a general scenario, leading to significant performance gains in relation to isotropic jamming. Additionally, we provide a set of results that cast further insight into the problem. In our scenario, which is applicable to current OFDM communications systems, we demonstrate that the proposed jammer power allocation strategy can lead to considerable secrecy gains.
2013
Authors
Costa, IC; da Rosa, MA; Sumaili, J; Carvalho, LD; Issicaba, D;
Publication
2013 IEEE GRENOBLE POWERTECH (POWERTECH)
Abstract
Currently, it is an ordinary procedure to restrict the use of renewables, mainly wind power, to accommodate a more stable set of generating units (e.g.: thermal units) to supply the load. The purpose of this paper is to discuss particular aspects from the adequacy and security evaluation of generation and transmission (G&T) system that must be revised due to the massive integration of wind power in the present and future energy systems. By running a sequential Monte Carlo simulation (SMCS) algorithm it is possible to assess the system adequacy identifying possible security constrains. The demonstration cases are based on the modified IEEE-RTS 79 system and a small planned configuration for a real G&T system, typically radial. The results extracted from the case studies illustrate that the impact resulting from the massive integration of renewable sources should not be assessed from the adequacy evaluation perspective without considering system security issues.
2013
Authors
Osorio, GJ; Matias, JCO; Catalao, JPS;
Publication
IET Conference Publications
Abstract
In the last few years, the efforts made by the scientific community to present efficient and effective tools to forecast the behaviour of wind power have been significant. These techniques in forecasting aim to help wind producers face the competition in deregulated electricity markets, and in this field the short-term tools are one line of defence for all market players to make acceptable bids, ensuring the robustness and reliability of the electricity system. This paper aims to present a review of the state-of-art reported by the scientific community over the last few years. This is based on forecasting wind power approaches in the short-term, in different regions of the world, with a particular focus on statistical, hybrid, intelligent, and time-series approaches, and reports on the most significant findings reported in journals within this field of knowledge.
2013
Authors
Correia, M; Matos, A;
Publication
2013 OCEANS - SAN DIEGO
Abstract
The majority of Autonomous Underwater Vehicles (AUVs) spend most of their energy in order to propel themselves. Therefore, a good path planning technique can improve both their autonomy and range, thus their performance. This paper proposes an optimized trajectory planning methodology able to find the best possible path from a starting point to a target position, taking advantage of the water currents. In addition, the possibility of water currents changing throughout the path is contemplated and both the optimal path and currents field are updated based on the detected deviations in a predefined number of checkpoints along the path. Finally, an estimate of the vehicle's real path is performed.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.