2022
Authors
Bastardo, R; Pavão, J; Rocha, NP;
Publication
Lecture Notes in Networks and Systems
Abstract
This paper presents a scoping review of the literature on user-centred usability evaluation of Embodied Communication Agents (ECAs) embedded in digital solutions to support older adults. Twenty-nine studies were included in this scoping review. The included studies reported the implementation of digital solutions to promote: (i) secure and supportive environment; (ii) healthcare provision; (iii) healthy lifestyles; and (iv) social involvement and active participation. In terms of usability evaluation, it was not possible to identify a common understanding on the methods and instruments being used since there is high heterogeneity in terms of experimental design. Moreover, some methodological flaws were identified when analysing the experimental design of the included studies. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
2022
Authors
Mahdavi, M; Javadi, MS; Wang, F; Catalao, JPS;
Publication
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS
Abstract
Consumption patterns of electric power systems are important for distribution companies, because of their significant impact on energy losses amount. Therefore, some incentives are suggested by distribution companies to energy consumers for correcting their consumption manner. For a specific load pattern, distribution system reconfiguration (DSR) is an effective way to mitigate energy losses. Hence, some research works have included load variations in the DSR problem to show the importance of consumption patterns in reconfiguration decisions. However, some of the specialized literature has ignored load changes in their reconfiguration models due to the high computational burden and processing time. On the other hand, the energy losses are calculated inaccurately if the consumption pattern is neglected. Consequently, the main goal of this article is to investigate load pattern impact on switching sequences to find out how much is load profile important for minimization of energy losses in DSR. The evaluations were carried out for three well-known distribution systems using a classic optimization tool, the A Mathematical Programming Language.
2022
Authors
Santo, A; Santos, A; Mamede, HS;
Publication
2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI)
Abstract
IoT devices that perform translation are often closed proprietary systems which offer no, or very limited, possibilities of being freely integrated with other IoT devices or systems/platforms and cannot be easily updated. The objective of this paper is to offer a Systematic Literature Review (SLR) approach to find and synthesise articles on IoT applications in machine translation and potential integration and interoperability functionalities, along with challenges that arise from it. This research identified IoT based projects/devices that implemented machine translation solutions, including ones that resorted to low-cost devices such as the raspberry pi, as well as challenges faced by IoT devices when it comes to integration/interoperability. The findings in this paper provide a way to become more familiar with IoT based machine translation devices/projects and IoT integration/interoperability challenges, as well as proposing new paths for research.
2022
Authors
Silva, S; Sousa, PR; Resende, JS; Coelho Antunes, LF;
Publication
TrustBus
Abstract
A honeypot is a controlled and secure environment to examine different threats and understand attack patterns. Due to the highly dynamic environments, the growing adoption and use of Internet of Things (IoT) devices make configuring honeypots complex. One of the current literature challenges is the need for a honeypot not to be detected by attackers, namely due to the delays that are required to make requests to external and remote servers. This work focuses on deploying honeypots virtually on IOT devices. With this technology, we can use endpoints to send specific honeypots on recent known vulnerabilities on IOT devices to find and notify attacks within the network, as much of this information is verified and made freely available by government entities. Unlike other approaches, the idea is not to have a fixed honeypot but a set of devices that can be used at any time as a honeypot (adapted to the latest threat) to test the network for a possible problem and then report to Threat Sharing Platform (TSP).
2022
Authors
Nagpal, H; Avramidis, I; Capitanescu, F; Madureira, AG;
Publication
IEEE Transactions on Sustainable Energy
Abstract
2022
Authors
Servranckx, T; Coelho, J; Vanhoucke, M;
Publication
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
Abstract
In this research, we present several extensions for the resource-constrained project scheduling problem with alternative subgraphs (RCPSP-AS). First of all, we investigate more complex variants of the alternative project structure. More precisely, we consider nested alterative subgraphs, linked alternative branches, multiple selection, caused and closed choices, and split choices. Secondly, we introduce non-renewable resources in the RCPSP-AS in order to implicitly avoid certain combinations of alternatives given a limited availability of this resource over the complete project horizon. We formulate both the basic RCPSP-AS and its extensions as an ILP model and solve it using Gurobi. The computational experiments are conducted on a large set of artificial project instances as well as three case studies. The results show the impact of the different extensions on the project makespan and the computational complexity. We observe that combinations of the proposed extensions might imply complex alternative project structures, resulting in an increasing computational complexity or even infeasible solutions. The analysis of the three case studies shows that it is hard to find feasible solutions with a small time limit or optimal solutions with a larger time limit for projects with a realistic size in terms of the number of activities or alternatives.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.