2022
Authors
Cerqueira, V; Torgo, L;
Publication
CoRR
Abstract
2022
Authors
Bastardo, R; Pavão, J; Rocha, NP;
Publication
Lecture Notes in Networks and Systems
Abstract
This paper presents a scoping review of the literature on user-centred usability evaluation of Embodied Communication Agents (ECAs) embedded in digital solutions to support older adults. Twenty-nine studies were included in this scoping review. The included studies reported the implementation of digital solutions to promote: (i) secure and supportive environment; (ii) healthcare provision; (iii) healthy lifestyles; and (iv) social involvement and active participation. In terms of usability evaluation, it was not possible to identify a common understanding on the methods and instruments being used since there is high heterogeneity in terms of experimental design. Moreover, some methodological flaws were identified when analysing the experimental design of the included studies. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
2022
Authors
Mahdavi, M; Javadi, MS; Wang, F; Catalao, JPS;
Publication
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS
Abstract
Consumption patterns of electric power systems are important for distribution companies, because of their significant impact on energy losses amount. Therefore, some incentives are suggested by distribution companies to energy consumers for correcting their consumption manner. For a specific load pattern, distribution system reconfiguration (DSR) is an effective way to mitigate energy losses. Hence, some research works have included load variations in the DSR problem to show the importance of consumption patterns in reconfiguration decisions. However, some of the specialized literature has ignored load changes in their reconfiguration models due to the high computational burden and processing time. On the other hand, the energy losses are calculated inaccurately if the consumption pattern is neglected. Consequently, the main goal of this article is to investigate load pattern impact on switching sequences to find out how much is load profile important for minimization of energy losses in DSR. The evaluations were carried out for three well-known distribution systems using a classic optimization tool, the A Mathematical Programming Language.
2022
Authors
Santo, A; Santos, A; Mamede, HS;
Publication
2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
IoT devices that perform translation are often closed proprietary systems which offer no, or very limited, possibilities of being freely integrated with other IoT devices or systems/platforms and cannot be easily updated. The objective of this paper is to offer a Systematic Literature Review (SLR) approach to find and synthesise articles on IoT applications in machine translation and potential integration and interoperability functionalities, along with challenges that arise from it. This research identified IoT based projects/devices that implemented machine translation solutions, including ones that resorted to low-cost devices such as the raspberry pi, as well as challenges faced by IoT devices when it comes to integration/interoperability. The findings in this paper provide a way to become more familiar with IoT based machine translation devices/projects and IoT integration/interoperability challenges, as well as proposing new paths for research.
2022
Authors
Silva, S; Sousa, PR; Resende, JS; Coelho Antunes, LF;
Publication
Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings
Abstract
A honeypot is a controlled and secure environment to examine different threats and understand attack patterns. Due to the highly dynamic environments, the growing adoption and use of Internet of Things (IoT) devices make configuring honeypots complex. One of the current literature challenges is the need for a honeypot not to be detected by attackers, namely due to the delays that are required to make requests to external and remote servers. This work focuses on deploying honeypots virtually on IOT devices. With this technology, we can use endpoints to send specific honeypots on recent known vulnerabilities on IOT devices to find and notify attacks within the network, as much of this information is verified and made freely available by government entities. Unlike other approaches, the idea is not to have a fixed honeypot but a set of devices that can be used at any time as a honeypot (adapted to the latest threat) to test the network for a possible problem and then report to Threat Sharing Platform (TSP). © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
2022
Authors
Nagpal, H; Avramidis, I; Capitanescu, F; Madureira, AG;
Publication
IEEE Transactions on Sustainable Energy
Abstract
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.