Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2023

Cascade Failures Analyses Improving Resilience on Transmission Expansion Planning

Authors
de Oliveira, LE; Vilaça, P; Saraiva, JT; Massignan, JAD;

Publication
2023 IEEE BELGRADE POWERTECH

Abstract
In every critical infrastructure system, unexpected events and outages have the potential to cause massive impacts, affecting people and the economy, such as in the power power grid blackouts. To avoid similar incidents in the future, extensive research is necessary to improve resilience and reliability of power grids. This work presents a Transmission Expansion Planning (TEP) model that confronts the largely adopted deterministic security criteria N-1 versus an AC-Cascade Failure Model (AC-CFM) analysis. The main goal is to highlight the importance of cascade failure analysis to increase power system resilience. Tests over the NREL-118 system verify the AC-CFM coupling in TEP models, demonstrating its benefits for assuming a risky proneness behavior for reaching long-term power grid resilience.

2023

People first - testing integrated digital research/teaching concepts from the ground up (CT)

Authors
Trigo, Luís; Silva, Carlos Sousa e; Almeida, Vera Moitinho de; Marques, Diogo;

Publication

Abstract

2023

Gamification on Cybersecurity Literacy: Social Sustainability and Educative Projects

Authors
Simões, J; Lourenço, J; Sargo, S; Morais, JC;

Publication
Springer Proceedings in Earth and Environmental Sciences

Abstract
The recent situation of the COVID-19 pandemic has stimulated both the discussion on the use of IT-related teaching tools and the exposure of the student population to vulnerabilities linked to cybersecurity literacy as an integral part of the educational projects of educational institutions and a component of the exercise of citizenship and social sustainability of educational communities. The study presented is based on the assumption that the use of gamification as an element or tool that promotes learning within digital environments may be feasible, and more specifically may function as a teaching element on issues related to cybersecurity for students, especially for higher education students. In order to quantify the openness of students to such a tool path, quantitative methodology was used, and a survey was carried out in two Polytechnic Institutions (PI), achieving a sample of 95 students, and seeking perceptions on positive impacts resulting from the creation of a game scenario for better learning. Results show that students, regardless of their higher education course, clearly understand what gamification is and its goals, and also that students adopt good cybersecurity practices according to their higher education course. This last result goes accordingly with the supposition that gamification can and should be used in cybersecurity literacy. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.

2023

An Inductive Logic Programming Approach for Entangled Tube Modeling in Bin Picking

Authors
Leao, G; Camacho, R; Sousa, A; Veiga, G;

Publication
ROBOT2022: FIFTH IBERIAN ROBOTICS CONFERENCE: ADVANCES IN ROBOTICS, VOL 2

Abstract
Bin picking is a challenging problem that involves using a robotic manipulator to remove, one-by-one, a set of objects randomly stacked in a container. When the objects are prone to entanglement, having an estimation of their pose and shape is highly valuable for more reliable grasp and motion planning. This paper focuses on modeling entangled tubes with varying degrees of curvature. An unconventional machine learning technique, Inductive Logic Programming (ILP), is used to construct sets of rules (theories) capable of modeling multiple tubes when given the cylinders that constitute them. Datasets of entangled tubes are created via simulation in Gazebo. Experiments using Aleph and SWI-Prolog illustrate how ILP can build explainable theories with a high performance, using a relatively small dataset and low amount of time for training. Therefore, this work serves as a proof-of-concept that ILP is a valuable method to acquire knowledge and validate heuristics for pose and shape estimation in complex bin picking scenarios.

2023

A review on urban traffic cameras: Video image processing techniques and applications

Authors
Barros, D; Ferreira, MC; Silva, AR;

Publication
Advances in Transportation Studies

Abstract
Nowadays, cities face severe problems related to traffic management and mobility in general. Therefore, technologies have been developed that can handle these situations and somehow mitigate the caused impact, such as CCTV cameras. However, the techniques for analyzing the images collected by these cameras are increasingly complex and have numerous applications, being dispersed in the literature. Therefore, this article fills an important research gap by presenting a systematic review of the literature on the possible applications of data collected from CCTV cameras and the image analysis and processing techniques that have been developed and proposed in recent years. This systematic review followed the PRISMA statement guidelines and checklist, and three databases were searched, namely Scopus, Web of Science, and Inspec. From the analysis performed, the following applications were identified: Image/video analysis and traffic estimation, pedestrian detection, traffic data analysis, and forecasting, and traffic management. Regarding the image analysis and processing techniques YOLO (only look once), GMM (Gaussian mixture method), morphological methods, fuzzy logic, and other proprietary methods stand out. After a thorough analysis of traffic data, most works still implemented relatively trivial traffic management systems to generate a series of actions to be eventually applied to traffic controllers. Additionally, it was realized that these techniques could be implemented in industrial products from a future perspective. © 2023, Aracne Editrice. All rights reserved.

2023

Specifying Event/Data-based Systems

Authors
Knapp, A; Hennicker, R; Madeira, A;

Publication
RELATIONAL AND ALGEBRAIC METHODS IN COMPUTER SCIENCE, RAMICS 2023

Abstract
Event/data-based systems are controlled by events, their local data state may change in reaction to events. Numerous methods and notations for specifying such reactive systems have been designed, though with varying focus on the different development steps and their refinement relations. We first briefly review some of such methods, like temporal/modal logic, TLA, UML state machines, symbolic transition systems, CSP, synchronous languages, and Event-B with their support for parallel composition and refinement. We then present E. -logic for covering a broad range of abstraction levels of event/data-based systems from abstract requirements to constructive specifications in a uniform foundation. E. -logic uses diamond and box modalities over structured events adopted from dynamic logic, for recursive process specifications it offers (control) state variables and binders from hybrid logic. The semantic interpretation relies on event/data transition systems; specification refinement is defined by model class inclusion. Constructive operational specifications given by state transition graphs can be characterised by a single E. -sentence. Also a variety of implementation constructors is available in E. -logic to support, among others, event refinement and parallel composition. Thus the whole development process can rely on E. -logic and its semantics as a common basis.

  • 468
  • 4353