Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2018

Modeling the Strategic Behavior of a Distribution Company in Wholesale Energy and Reserve Markets

Autores
Bahramara, S; Yazdani Damavandi, M; Contreras, J; Shafie Khah, M; Catalao, JPS;

Publicação
IEEE TRANSACTIONS ON SMART GRID

Abstract
The decision making framework in power systems has changed due to presence of distributed energy resources (DERs). These resources are installed in distribution networks to meet demand locally. Therefore, distribution companies (Discos) are able to supply energy through these resources to meet their demand at a minimum operation cost. In this framework, the Disco will change its role in the wholesale energy market from price taker to price maker. DERs can provide reserve in their normal operation; this facilitates the provision of reserves by the Disco in the wholesale reserve market. Therefore, in this paper, the strategic behavior of a Disco in wholesale energy and reserve markets is modeled as a bi-level optimization problem. In the proposed model, the operation problem of the Disco and the independent system operator are modeled in the tipper- and lower-level problems, respectively. Karush-Kuhn-Tucker conditions and duality theory are used to transform the proposed nonlinear hi-level problem to a linear single level one. Numerical studies show the effectiveness of the proposed model and its solution methodology.

2018

Physical exercise intensity monitoring through eye-blink and mouth's shape analysis

Autores
Khanal, SR; Fonseca, A; Marques, A; Barroso, J; Filipe, V;

Publicação
PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON TECHNOLOGY AND INNOVATION IN SPORTS, HEALTH AND WELLBEING (TISHW)

Abstract
The continuous use of the muscles in any kind of physical exercises results in muscular fatigue, which can be defined as the incapability of the muscle to perform with the same effectiveness over the course of time. The analysis of physical exercise intensity has great importance in various fields, including sports and physiotherapy. In this paper, the rate of blinking eyes and the change in shape of mouth throughout the physical exercise are analyzed using computer vision techniques, and compared with the perceived exertion. The experiments were done using the facial video of three athletes, grabbed during a stationary cycle of physical exercise, until maximal muscle activity was achieved. The perceived exertion was reported at the end of each minute. The blinking of the eyes and opening of the mouth were detected by counting the number of bright pixels in the region of interest of an eye and of the mouth. These regions were detected using the Viola and Jones algorithm. We have proved the existence of a correlation between the opening and closing of the mouth and the eye-blinking rates with the physical exercise intensity (i.e., the higher the exercise intensity, the higher the rate of eye-blinking and mouth opening and closing). We obtained 95% accuracy in blinking eye detection.

2018

Technical Communications of the 33rd International Conference on Logic Programming, ICLP 2017, August 28 to September 1, 2017, Melbourne, Australia

Autores
Rocha, R; Son, TC; Mears, C; Saeedloei, N;

Publicação
ICLP (Technical Communications)

Abstract

2018

Triple-Similarity Mechanism for alarm management in the cloud

Autores
Dalmazo, BL; Vilela, JP; Curado, M;

Publicação
COMPUTERS & SECURITY

Abstract
Its distributed nature and ubiquitous service make the cloud subject to several vulnerabilities. One of the main tools used for reporting suspicious activity in the network's traffic is the Intrusion Detection System. However, two significant problems arise: the huge volume of control messages between the virtual machines and the servers; and the associated transfer costs. In this work, we propose a Triple-Similarity Mechanism (T-SyM) for grouping similar alarms that may correspond to the same attack (or attempt) in order to reduce the number of messages and, consequently, the total amount of information. In addition, we propose an algorithm for calculating the severity level of the alarms. T-SyM works on the basis of 3 steps: individual similarity (Euclidian distance), clustering relevant features (k-means algorithm) and generating the output (the Tanimoto coefficient). An evaluation of the most common attacks is performed using real traces from an IDS. Our mechanism was able to decrease the number of alarms by up to 90% and reduce the total amount of data by more than 80%.

2018

Flexibility products and markets: Literature review

Autores
Villar, J; Bessa, R; Matos, M;

Publicação
ELECTRIC POWER SYSTEMS RESEARCH

Abstract
This paper reviews flexibility products and flexibility markets, currently being discussed or designed to help in the operation of power systems under their evolving environment. This evolution is characterized by the increase of renewable generation and distributed energy resources (including distributed generation, self-consumption, demand response and electric vehicles). The paper is an attempt to review and classify flexibility products considering its main attributes such as scope, purpose, location or provider, and to summarize some of the main approaches to flexibility markets designs and implementations. Main current literature gaps and most promising research lines for future work are also identified.

2018

Table space designs for implicit and explicit concurrent tabled evaluation

Autores
Areias, M; Rocha, R;

Publicação
THEORY AND PRACTICE OF LOGIC PROGRAMMING

Abstract
One of the main advantages of Prolog is its potential for the implicit exploitation of parallelism and, as a high-level language, Prolog is also often used as a means to explicitly control concurrent tasks. Tabling is a powerful implementation technique that overcomes some limitations of traditional Prolog systems in dealing with recursion and redundant subcomputations. Given these advantages, the question that arises is if tabling has also the potential for the exploitation of concurrency/parallelism. On one hand, tabling still exploits a search space as traditional Prolog but, on the other hand, the concurrent model of tabling is necessarily far more complex, since it also introduces concurrency on the access to the tables. In this paper, we summarize Yap's main contributions to concurrent tabled evaluation and we describe the design and implementation challenges of several alternative table space designs for implicit and explicit concurrent tabled evaluation that represent different tradeoffs between concurrency and memory usage. We also motivate for the advantages of using fixed-size and lock freedata structures, elaborate on the key role that the engine's memory allocator plays on such environments, and discuss how Yap's mode-directed tabling support can be extended to concurrent evaluation. Finally, we present our future perspectives toward an efficient and novel concurrent framework which integrates both implicit and explicit concurrent tabled evaluation in a single Prolog engine.

  • 1777
  • 4212