2023
Authors
Santos, R; Alexandre, R; Marques, P; Antunes, M; Barraca, JP; Silva, J; Ferreira, N;
Publication
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2023, Lisbon, Portugal, February 22-24, 2023.
Abstract
The management of health systems has been one of the main challenges in several European countries, especially where the aging population is increasing. This led to the adoption of smarter technologies as a means to automate the processes within hospitals. One of the technologies adopted is active location solutions, which allows the staff within the hospital to quickly find any sort of entity, from key persons to equipment. In this work, we focus on developing a reliable method for active location based on RSSI antennas, passive tags, and ML models. Since the tags are passive, the usage of RSSI is discouraged, since it does not vary sufficiently based on our experiments. We explored the usage of alternative features, such as the number of activations per tag within a time slot. Throughout our evaluation, we were able to reach an average error of 0.275 m which is similar to existing RSSI IPS.
2023
Authors
Freitas, T; Soares, J; Correia, ME; Martins, R;
Publication
COMPUTERS & SECURITY
Abstract
Byzantine Fault tolerant (BFT) protocols are implemented to guarantee the correct system/application behavior even in the presence of arbitrary faults (i.e., Byzantine faults). Byzantine Fault tolerant State Machine Replication (BFT-SMR) is a known software solution for masking arbitrary faults and malicious attacks (Liu et al., 2020). In this survey, we present and discuss relevant BFT-SMR protocols, focusing on deterministic and probabilistic approaches. The main purpose of this paper is to discuss the characteristics of proposed works for each approach, as well as identify the trade-offs for each different approach.& COPY; 2023 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
2023
Authors
Salem, KH; Silva, E; Oliveira, JF;
Publication
INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH
Abstract
Cutting and packing problems are hard combinatorial optimization problems that arise in several manufacturing and process industries or in their supply chains. The solution of these problems is not only a scientific challenge but also has a large economic impact, as it contributes to the reduction of one of the major cost factors for many production sectors, namely raw materials, together with a positive environmental impact. The explicit consideration of uncertainty when solving cutting and packing problems with optimization techniques is crucial for a wider adoption of research results by companies. However, current research has paid little attention to the role of uncertainty in these problems. In this paper, we review the existing literature on uncertainty in cutting and packing problems, propose a classification framework, and highlight the many research gaps and opportunities for scientific contributions.
2023
Authors
Cardoso, AS; Bryukhova, S; Renna, F; Reino, L; Xu, C; Xiao, ZX; Correia, R; Di Minin, E; Ribeiro, J; Vaz, AS;
Publication
BIOLOGICAL CONSERVATION
Abstract
E-commerce has become a booming market for wildlife trafficking, as online platforms are increasingly more accessible and easier to navigate by sellers, while still lacking adequate supervision. Artificial intelligence models, and specifically deep learning, have been emerging as promising tools for the automated analysis and monitoring of digital online content pertaining to wildlife trade. Here, we used and fine-tuned freely available artificial intelligence models (i.e., convolutional neural networks) to understand the potential of these models to identify instances of wildlife trade. We specifically focused on pangolin species, which are among the most trafficked mammals globally and receiving increasing trade attention since the COVID-19 pandemic. Our convolutional neural networks were trained using online images (available from iNaturalist, Flickr and Google) displaying both traded and non-traded pangolin settings. The trained models showed great performances, being able to identify over 90 % of potential instances of pangolin trade in the considered imagery dataset. These instances included the showcasing of pangolins in popular marketplaces (e.g., wet markets and cages), and the displaying of commonly traded pangolin parts and derivates (e.g., scales) online. Nevertheless, not all instances of pangolin trade could be identified by our models (e.g., in images with dark colours and shaded areas), leaving space for further research developments. The methodological developments and results from this exploratory study represent an advancement in the monitoring of online wildlife trade. Complementing our approach with other forms of online data, such as text, would be a way forward to deliver more robust monitoring tools for online trafficking.
2023
Authors
Masouros, D; Soudris, D; Gardikis, G; Katsarou, V; Christopoulou, M; Xilouris, G; Ramón, H; Pastor, A; Scaglione, F; Petrollini, C; Pinto, A; Vilela, JP; Karamatskou, A; Papadakis, N; Angelogianni, A; Giannetsos, T; García Villalba, LJ; Alonso López, JA; Strand, M; Grov, G; Bikos, AN; Ramantas, K; Santos, R; Silva, F; Tsampieris, N;
Publication
Embedded Computer Systems: Architectures, Modeling, and Simulation - 23rd International Conference, SAMOS 2023, Samos, Greece, July 2-6, 2023, Proceedings
Abstract
The advent of 6G networks is anticipated to introduce a myriad of new technology enablers, including heterogeneous radio, RAN softwarization, multi-vendor deployments, and AI-driven network management, which is expected to broaden the existing threat landscape, demanding for more sophisticated security controls. At the same time, privacy forms a fundamental pillar in the EU development activities for 6G. This decentralized and globally connected environment necessitates robust privacy provisions that encompass all layers of the network stack. In this paper, we present PRIVATEER’s approach for enabling “privacy-first” security enablers for 6G networks. PRIVATEER aims to tackle four major privacy challenges associated with 6G security enablers, i.e., i) processing of infrastructure and network usage data, ii) security-aware orchestration, iii) infrastructure and service attestation and iv) cyber threat intelligence sharing. PRIVATEER addresses the above by introducing several innovations, including decentralised robust security analytics, privacy-aware techniques for network slicing and service orchestration and distributed infrastructure and service attestation mechanisms. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.
2023
Authors
Assis, T; Martins, C; Valle, A; Santos, A; Castro, J; Osório, L; Silva, P;
Publication
ICERI2023 Proceedings - ICERI Proceedings
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.