Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2020

Service Design for Business Process Reengineering

Autores
Banica, B; Patricio, L;

Publicação
EXPLORING SERVICE SCIENCE (IESS 2020)

Abstract
In the technology enabled, competitive service environment, organizations try to innovate their service while redesigning their processes to increase efficiency. The present study is aimed at developing a design method that brings together, complementarily, constructs and approaches from two fields: Service Design, which offers a human-centered, holistic focus on creating novel services and Business Process Reengineering, mainly organizational, process redesign and process efficiency focused. The Service Design for Business Process Reengineering (SD4BPR) method was developed following a Design Science Research methodology and it was applied in a business environment for the improvement of the Pre-Sale processes of a software development company dedicated to the health area. The development of the method and its process of work are presented and discussed in order to show how SD4PBR can support the design of technology-enabled services while taking into consideration organizational issues and desired business efficiency.

2020

Transfer Learning in urban object classification: Online images to recognize point clouds

Autores
Balado, J; Sousa, R; Diaz Vilarino, L; Arias, P;

Publicação
AUTOMATION IN CONSTRUCTION

Abstract
The application of Deep Learning techniques to point clouds for urban object classification is limited by the large number of samples needed. Acquiring and tagging point clouds is more expensive and tedious labour than its image equivalent process. Point cloud online datasets contain few samples for Deep Learning or not always the desired classes This work focuses on minimizing the use of point cloud samples for neural network training in urban object classification. The method proposed is based on the conversion of point clouds to images (pc-images) because it enables: the use of Convolutional Neural Networks, the generation of several samples (images) per object (point clouds) by means of multi-view, and the combination of pc-images with images from online datasets (ImageNet and Google Images). The study is conducted with ten classes of objects extracted from two street point clouds from two different cities. The network selected for the job is the InceptionV3. The training set consists of 5000 online images with a variable percentage (0% to 10%) of pc-images. The validation and testing sets are composed exclusively of pc-images. Although the network trained only with online images reached 47% accuracy, the inclusion of a small percentage of pc-images in the training set improves the classification to 99.5% accuracy with 6% pc-images. The network is also applied at IQmulus & TerraMobilita Contest dataset and it allows the correct classification of elements with few samples.

2020

A case study on using heavy-hitters in interconnect bypass fraud

Autores
Veloso, B; Gama, J; Martins, C; Espanha, R; Azevedo, R;

Publicação
ACM SIGAPP Applied Computing Review

Abstract
Nowadays, fraudsters are continually trying to explore technical gaps in telecom companies to get some profit. The high cost of international termination rates in Telecom Companies, and mainly because of their high asymmetry property, attracts the attention of fraudsters. In this paper, we explore the application of three deterministic algorithms and one probabilistic, that combined can help to identify possible abnormal behaviors. Interconnect Bypass Fraud (IBF) is on the top three (worldwide), most common frauds in the telecommunication domain. Typically, the Telecom Companies can detect IBF by the occurrence of bursts of calls, repetitions, and mirror behaviors from specific numbers. The goal of our work is to discover as soon as possible numbers with abnormal behaviors and based on this assumption we developed: ( i ) the lossy count algorithm with fast forgetting technique; and ( ii ) the single-pass hierarchical heavy hitter algorithm that also contains a forgetting technique; as well as the application of the HyperLogLog sketches, and the application of sticky sampling algorithm. We applied the four algorithms in two real datasets and did a parameter sensitivity analysis. The results show that our two proposals (Lossy Counting with fast forgetting and the Hierarchical Heavy Hitters) can capture the most recent abnormal behaviors, faster than the baseline algorithms. Nonetheless, these four algorithms combined can make the fraud task more difficult and can complement the techniques used by the Telecom Company.

2020

Analyses of non-coding somatic drivers in 2,658 cancer whole genomes

Autores
Rheinbay, E; PCAWG Drivers and Functional Interpretation Working Group,; Nielsen, MM; Abascal, F; Wala, JA; Shapira, O; Tiao, G; Hornshøj, H; Hess, JM; Juul, RI; Lin, Z; Feuerbach, L; Sabarinathan, R; Madsen, T; Kim, J; Mularoni, L; Shuai, S; Lanzós, A; Herrmann, C; Maruvka, YE; Shen, C; Amin, SB; Bandopadhayay, P; Bertl, J; Boroevich, KA; Busanovich, J; Carlevaro-Fita, J; Chakravarty, D; Chan, CWY; Craft, D; Dhingra, P; Diamanti, K; Fonseca, NA; Gonzalez-Perez, A; Guo, Q; Hamilton, MP; Haradhvala, NJ; Hong, C; Isaev, K; Johnson, TA; Juul, M; Kahles, A; Kahraman, A; Kim, Y; Komorowski, J; Kumar, K; Kumar, S; Lee, D; Lehmann, K; Li, Y; Liu, EM; Lochovsky, L; Park, K; Pich, O; Roberts, ND; Saksena, G; Schumacher, SE; Sidiropoulos, N; Sieverling, L; Sinnott-Armstrong, N; Stewart, C; Tamborero, D; Tubio, JMC; Umer, HM; Uusküla-Reimand, L; Wadelius, C; Wadi, L; Yao, X; Zhang, C; Zhang, J; Haber, JE; Hobolth, A; Imielinski, M; Kellis, M; Lawrence, MS; von Mering, C; Nakagawa, H; Raphael, BJ; Rubin, MA; Sander, C; Stein, LD; Stuart, JM; Tsunoda, T; Wheeler, DA; Johnson, R; Reimand, J; Gerstein, M; Khurana, E; Campbell, PJ; López-Bigas, N; Weischenfeldt, J; Beroukhim, R; Martincorena, I; Pedersen, JS; Getz, G; PCAWG Structural Variation Working Group,; PCAWG Consortium,;

Publicação
Nat.

Abstract
The discovery of drivers of cancer has traditionally focused on protein-coding genes1–4. Here we present analyses of driver point mutations and structural variants in non-coding regions across 2,658 genomes from the Pan-Cancer Analysis of Whole Genomes (PCAWG) Consortium5 of the International Cancer Genome Consortium (ICGC) and The Cancer Genome Atlas (TCGA). For point mutations, we developed a statistically rigorous strategy for combining significance levels from multiple methods of driver discovery that overcomes the limitations of individual methods. For structural variants, we present two methods of driver discovery, and identify regions that are significantly affected by recurrent breakpoints and recurrent somatic juxtapositions. Our analyses confirm previously reported drivers6,7, raise doubts about others and identify novel candidates, including point mutations in the 5' region of TP53, in the 3' untranslated regions of NFKBIZ and TOB1, focal deletions in BRD4 and rearrangements in the loci of AKR1C genes. We show that although point mutations and structural variants that drive cancer are less frequent in non-coding genes and regulatory sequences than in protein-coding genes, additional examples of these drivers will be found as more cancer genomes become available. © 2020, The Author(s).

2020

An RNA-seq Based Machine Learning Approach Identifies Latent Tuberculosis Patients With an Active Tuberculosis Profile

Autores
Estévez, O; Anibarro, L; Garet, E; Pallares, Á; Barcia, L; Calviño, L; Maueia, C; Mussá, T; Fdez Riverola, F; Glez Peña, D; Reboiro Jato, M; López Fernández, H; Fonseca, NA; Reljic, R; González Fernández, Á;

Publicação
Frontiers in Immunology

Abstract
A better understanding of the response against Tuberculosis (TB) infection is required to accurately identify the individuals with an active or a latent TB infection (LTBI) and also those LTBI patients at higher risk of developing active TB. In this work, we have used the information obtained from studying the gene expression profile of active TB patients and their infected –LTBI- or uninfected –NoTBI- contacts, recruited in Spain and Mozambique, to build a class-prediction model that identifies individuals with a TB infection profile. Following this approach, we have identified several genes and metabolic pathways that provide important information of the immune mechanisms triggered against TB infection. As a novelty of our work, a combination of this class-prediction model and the direct measurement of different immunological parameters, was used to identify a subset of LTBI contacts (called TB-like) whose transcriptional and immunological profiles are suggestive of infection with a higher probability of developing active TB. Validation of this novel approach to identifying LTBI individuals with the highest risk of active TB disease merits further longitudinal studies on larger cohorts in TB endemic areas. © Copyright © 2020 Estévez, Anibarro, Garet, Pallares, Barcia, Calviño, Maueia, Mussá, Fdez-Riverola, Glez-Peña, Reboiro-Jato, López-Fernández, Fonseca, Reljic and González-Fernández.

2020

Blockchain and Applications - International Congress, BLOCKCHAIN 2019, Avila, Spain, 26-28 June, 2019

Autores
Prieto, J; Das, AK; Ferretti, S; Pinto, A; Corchado, JM;

Publicação
BLOCKCHAIN

Abstract

  • 1251
  • 4141