Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2024

Road networks structure analysis: A preliminary network science-based approach

Authors
Reza, S; Ferreira, MC; Machado, JJM; Tavares, JMRS;

Publication
ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE

Abstract
Road network studies attracted unprecedented and overwhelming interest in recent years due to the clear relationship between human existence and city evolution. Current studies cover many aspects of a road network, for example, road feature extraction from video/image data, road map generalisation, traffic simulation, optimisation of optimal route finding problems, and traffic state prediction. However, analysing road networks as a complex graph is a field to explore. This study presents comparative studies on the Porto, in Portugal, road network sections, mainly of Matosinhos, Paranhos, and Maia municipalities, regarding degree distributions, clustering coefficients, centrality measures, connected components, k-nearest neighbours, and shortest paths. Further insights into the networks took into account the community structures, page rank, and small-world analysis. The results show that the information exchange efficiency of Matosinhos is 0.8, which is 10 and 12.8% more significant than that of the Maia and Paranhos networks, respectively. Other findings stated are: (1) the studied road networks are very accessible and densely linked; (2) they are small-world in nature, with an average length of the shortest pathways between any two roads of 29.17 units, which as found in the scenario of the Maia road network; and (3) the most critical intersections of the studied network are 'Avenida da Boavista, 4100-119 Porto (latitude: 41.157944, longitude: - 8.629105)', and 'Autoestrada do Norte, Porto (latitude: 41.1687869, longitude: - 8.6400656)', based on the analysis of centrality measures.

2024

Data Engineering Roadmap for Implementing Business Intelligence in Higher Education

Authors
Sequeira, R; Reis, A; Branco, F; Alves, P;

Publication
2024 IEEE 18TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES, AICT 2024

Abstract
This article addresses the implementation of Business Intelligence (BI) systems in Higher Education Institutions (HEIs), focusing on developing an appropriate data architecture that meets the specificities and requirements of this sector. With the rapid advance of information technologies, HEIs face the growing challenge of managing a considerable volume of data, making it essential to implement BI systems that support informed and efficient decision-making. Using the Design Science Research methodology, this study proposes a BI architecture model that aligns technologies with HEIs' academic and administrative needs and facilitates their integration and ongoing maintenance. The model is designed to be flexible and scalable, allowing adaptations as institutional needs evolve. The article describes the architecture development process, from initial planning to implementation, and discusses how this framework can significantly improve data management and the quality of decision-making processes in educational institutions. The research offers practical and theoretical insights for academics and managers seeking to optimize the use of BI in educational contexts.

2024

Playing Tic-Tac-Toe with Dobot Magician: An Experiment to Engage Students for Engineering Studies

Authors
Oliveira, D; Filipe, V; Oliveira, PM;

Publication
Lecture Notes in Educational Technology

Abstract
Encouraging pre-university students to pursue engineering courses at the university level is essential to meet the industry’s escalating demand for engineers. Each year, universities host hundreds of secondary students who tour their facilities to get a feel for the academic environment. This paper discusses an educational experiment designed as part of a semester-long undergraduate project in Informatics Engineering. The project involves tailoring a Dobot Magician robot, equipped with a standard webcam, to engage in a game of tic-tac-toe against a human user. The camera stream is continuously processed by a computer vision algorithm to detect the pieces placement in the game board. The paper outlines the project development stages, the elements involved, and presents preliminary test results. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.

2024

Unveiling Malicious Network Flows Using Benford's Law

Authors
Fernandes, P; Ciardhuáin, SO; Antunes, M;

Publication
MATHEMATICS

Abstract
The increasing proliferation of cyber-attacks threatening the security of computer networks has driven the development of more effective methods for identifying malicious network flows. The inclusion of statistical laws, such as Benford's Law, and distance functions, applied to the first digits of network flow metadata, such as IP addresses or packet sizes, facilitates the detection of abnormal patterns in the digits. These techniques also allow for quantifying discrepancies between expected and suspicious flows, significantly enhancing the accuracy and speed of threat detection. This paper introduces a novel method for identifying and analyzing anomalies within computer networks. It integrates Benford's Law into the analysis process and incorporates a range of distance functions, namely the Mean Absolute Deviation (MAD), the Kolmogorov-Smirnov test (KS), and the Kullback-Leibler divergence (KL), which serve as dispersion measures for quantifying the extent of anomalies detected in network flows. Benford's Law is recognized for its effectiveness in identifying anomalous patterns, especially in detecting irregularities in the first digit of the data. In addition, Bayes' Theorem was implemented in conjunction with the distance functions to enhance the detection of malicious traffic flows. Bayes' Theorem provides a probabilistic perspective on whether a traffic flow is malicious or benign. This approach is characterized by its flexibility in incorporating new evidence, allowing the model to adapt to emerging malicious behavior patterns as they arise. Meanwhile, the distance functions offer a quantitative assessment, measuring specific differences between traffic flows, such as frequency, packet size, time between packets, and other relevant metadata. Integrating these techniques has increased the model's sensitivity in detecting malicious flows, reducing the number of false positives and negatives, and enhancing the resolution and effectiveness of traffic analysis. Furthermore, these techniques expedite decisions regarding the nature of traffic flows based on a solid statistical foundation and provide a better understanding of the characteristics that define these flows, contributing to the comprehension of attack vectors and aiding in preventing future intrusions. The effectiveness and applicability of this joint method have been demonstrated through experiments with the CICIDS2017 public dataset, which was explicitly designed to simulate real scenarios and provide valuable information to security professionals when analyzing computer networks. The proposed methodology opens up new perspectives in investigating and detecting anomalies and intrusions in computer networks, which are often attributed to cyber-attacks. This development culminates in creating a promising model that stands out for its effectiveness and speed, accurately identifying possible intrusions with an F1 of nearly 80%, a recall of 99.42%, and an accuracy of 65.84%.

2024

Advance Reconnaissance of UGV Path Planning Using Unmanned Aerial Vehicle to Carry Our Mission in Unknown Environment

Authors
Nowakowski, M; Berger, GS; Braun, J; Mendes, JA; Bonzatto, L Jr; Lima, J;

Publication
ROBOT 2023: SIXTH IBERIAN ROBOTICS CONFERENCE, VOL 2

Abstract
The utilization of unmanned vehicles for specialized tasks has gained significant attention in both military and civilian domains. This article explores the application of commercial unmanned aerial vehicles (UAVs) for reconnaissance purposes, specifically to verify autonomous driving missions assigned to the developed TAERO manned-unmanned vehicle in field operations. The paper introduces the TAERO vehicle, highlighting its functionality and capabilities for unmanned missions. The architecture of the unmanned ground vehicle (UGV) system is discussed taking into consideration the autonomy subsystem and used location data. The limitations associated with terrain and potential obstacles are addressed as well as importance of acquiring accurate terrain information for successful autonomous operation. The solution proposed in our study involves the use of a commercially available UAV applied to the visual tracking of potential targets in an engagement scenario. Details related to flight route planning system, geolocation, target tracking, and data transmission between robotic platforms are discussed and presented in this work. The acquired real-time data plays a crucial role in confirm- ing the mission, making necessary adjustments, or altering the planned route. The UAV platform, known for its maneuverability and operational capabilities, can operate ahead as a reconnaissance element, improving the overall reconnaissance capabilities of the system. Upon completion of the mission, the UAV can return to the base or land on a moving vehicle platform. The authors proposed integration of a UAV that significantly enhances the autonomous mode capabilities of unmanned ground platform, improving operation in unknown environment during special mission.

2024

Many-objective sectorization for last-mile delivery optimization: A decision support system

Authors
Torres, G; Fontes, T; Rodrigues, AM; Rocha, P; Ribeiro, J; Ferreira, JS;

Publication
EXPERT SYSTEMS WITH APPLICATIONS

Abstract
The efficient last-mile delivery of goods involves complex challenges in optimizing driver sectors and routes. This problem tends to be large-scale and involves several criteria to meet simultaneously, such as creating compact sectors, balancing the workload among drivers, minimizing the number of undelivered packages and reducing the dissimilarity of sectors on different days. This work proposes a Decision Support System (DSS) that allows decision-makers to select improved allocation strategies to define sectors. The main contribution is an interactive DSS tool that addresses a many-objective (more than 3 objectives) sectorization problem with integrated routing. It establishes a global allocation strategy and uses it as a benchmark for the created daily allocations and routes. A Preference-Inspired Co-Evolutionary Algorithm with Goal vectors using Mating Restriction (PICEA-g-mr) is employed to solve the many-objective optimization problem. The DSS also includes a visualization tool to aid decision-makers in selecting the most suitable allocation strategy. The approach was tested in a medium-sized Metropolitan Area and evaluated using resource evaluation metrics and visualization methods. The proposed DSS deals effectively and efficiently with the sectorization problem in the context of last-mile delivery by producing a set of viable and good-quality allocations, empowering decision-makers in selecting better allocation strategies. Focused on enhancing service efficiency and driver satisfaction, the DSS serves as a valuable tool to improve overall service quality.

  • 326
  • 4387