Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2019

Critical Outage Determination via a Sensitivity Study of the Portuguese Electric Transmission Network

Autores
Carvalhosa, S; Moura, AM; Matos, F; MacHado, N; Castro, JP;

Publicação
SEST 2019 - 2nd International Conference on Smart Energy Systems and Technologies

Abstract
Since the entry into service of the so-called Primary Network in 1951 until the 1960s, when the first electrical power interconnection between Portugal and Spain was created, that the Portuguese National Transmission Network could be considered a closed system, however, since the year 1961, that was no longer true. Taking these facts into account, the need to think and draw up new standards and regulations, with the widest possible coverage, has arisen in order to oblige European operators to maintain a level of control, security and knowledge of their transmission networks, which ensure that these do not influence each other negatively and that there is a coordinated response to incidents that may occur. © 2019 IEEE.

2019

Continuous Authentication in Mobile Devices Using Behavioral Biometrics

Autores
Rocha, R; Carneiro, D; Costa, R; Analide, C;

Publicação
Ambient Intelligence - Software and Applications -,10th International Symposium on Ambient Intelligence, ISAmI 2019, Ávila, Spain, 26-28 June 2019.

Abstract
In recent years, the development and use of mobile devices such as smartphones and tablets grew significantly. They are used for virtually every activity of our lives, from communication or online shopping to e-banking or gaming, just to name a few. As a consequence, these devices contribute significantly to make our lives more digital, with all the perks and risks that this encompasses. One of the most serious risk is that of an authorized individual gaining physical access to our mobile device and, potentially, to all the applications and personal data it contains. Most of mobile devices are protected using some kind of password, that can be easily spotted by unauthorized users or event guessed. In the last years, new authentication mechanisms have been proposed, such as those using traditional biometrics or behavioral biometrics. In this paper we propose a new continuous authentication mechanism for mobile devices based on behavioral biometrics that monitors user interaction behavior for classifying the identity of the user. © Springer Nature Switzerland AG 2020.

2019

Smart Marketing With the Internet of Things

Autores
Simões, D; Barbosa, B; Filipe, S;

Publicação
Advances in Marketing, Customer Relationship Management, and E-Services

Abstract
No abstract available.

2019

Special track on data streams

Autores
Bifet, A; Carvalho, A; Ferreira, C; Gama, J;

Publicação
Proceedings of the ACM Symposium on Applied Computing

Abstract

2019

Maximum Loadability of Meshed Networks: A Sequential Convex Optimization Approach

Autores
Wu, D; Yang, L; Wei, W; Chen, L; Lotfi, M; Catalao, JPS;

Publicação
SEST 2019 - 2nd International Conference on Smart Energy Systems and Technologies

Abstract
In power system static security analysis, it often requires to calculate continuous power flow from a certain load condition to a bifurcation point along a given direction, which is referred to as the maximum loadability problem. This paper proposes a convex optimization method for maximum loadability problem over meshed power grids based on the semidefinite relaxation approach. Because the objective is to maximize the load increasing distance, convex relaxation model is generally inexact, unlike the situation in cost-minimum optimal power flow problem. Inspired by the rank penalty method, this paper proposes an iterative procedure to retrieve the maximum loadability. The convex quadratic term representing the penalty on the rank of matrix variable is updated in each iteration based on the latest solution. In order to expedite convergence, generator reactive power is also included in the objective function, which has been reported in literature. Numeric tests on some small-scale systems validate its effectiveness. Any sparsity-exploration and acceleration techniques for semidefinite programming can improve the efficiency of the proposed approach. © 2019 IEEE.

2019

Assessment of Real-Time Tariffs for Electric Vehicles in Denmark

Autores
Soares, T; Fonseca, C; Morais, H; Ramos, S; Sousa, T;

Publicação
2019 IEEE MILAN POWERTECH

Abstract
The charging behavior of electric vehicles (EVs) is a key concern to system operators and retailers given a massive adoption these resources. System operators and retailers may profit from the handling of EVs as flexible loads. The former has interest to move their charging into periods without congestion and voltage problems. Similarly, the latter wants them to only charge at periods when energy is cheaper. This paper addresses the problem by modelling a real-time tariff to encourage flexible EVs charging behavior. More precisely, different tariffs are modelled based on the relation between wind power generation, load consumption and spot price, while assuming Denmark as showcase. The EVs behavior entails three different patterns and a socioeconomic term that defines the anxiety of EVs users' to be responsive to the tariffs. An important conclusion is that a proper real-time tariff design can reduce the energy costs for the retailer and EVs.

  • 1524
  • 4201