Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2017

Optimization for Sustainable Manufacturing <i>Application of Optimization Techniques to Foster Resource Efficiency</i>

Autores
Ferrera, E; Tisseur, R; Lorenço, E; Silva, EJ; Baptista, AJ; Cardeal, G; Peças, P;

Publicação
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY

Abstract
Resource efficiency assessment methods, along with eco-efficiency assessment methods are needed for various industrial sectors to support sustainable development, decision-making and evaluate efficiency performance. The combination of eco-efficiency with efficiency assessment allows to identify major inefficiencies and provides means to foster sustainability, through the efficient and effective material and energy use. Despite the available information for decision making, this proves to be a difficult task in the manufacturing industry, therefore, there is a real need to develop and use optimization techniques to enhance resource efficiency. In this context, and due to the lack of simple and integrated tools to assess and optimize resource efficiency, crossing the different environmental and economic aspects, arises the need to develop optimisations models, enabling support and optimize sustainable decision making process and identification of potential improvements. The optimisation method should provide robust knowledge to support decisionmaking, allow comparability of the results and consider a cost-saving approach to help set priorities. Moreover, the optimisation techniques should centre the process through design/configuration of the production system, without considering time, in order not to limit the physical agents.

2017

Hybrid simulation for complex manufacturing value-chain environments

Autores
Barbosa, C; Azevedo, A;

Publicação
27TH INTERNATIONAL CONFERENCE ON FLEXIBLE AUTOMATION AND INTELLIGENT MANUFACTURING, FAIM2017

Abstract
Hybrid simulation is nowadays a valid alternative for studying complex manufacturing environments. Some challenges exist in this context, as the ambiguous use of terms and definitions in the literature; and the demanding skills required for developing hybrid models. A structured literature review provides an overview of the use of hybrid simulation in manufacturing business performance and its most important advantages and drawbacks. A classification scheme for the 51 analysed papers is presented, including interfaced, sequential, enrichment, and integrated taxonomies. (C) 2017 The Authors. Published by Elsevier B.V.

2017

Nash equilibrium for Proactive Anti-jamming in IEEE 802.15.4e (Emerging wireless sensor actuator technologies for 14.0)

Autores
Homay, A; de Sousa, M; Almeida, L;

Publicação
2017 IEEE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN)

Abstract
An emerging trend in industry 4.0 is to use wireless communication infrastructure and mesh networks in applications requiring high reliability and safety. Although not a typical industrial production process, railway vehicular networks are also an industrial application which come with stringent reliability and safety requirements. Current research is focusing on using vehicular networks as an enabling technology to actively control the separation between two consecutive vehicles, enforcing a safe distance which is nevertheless much shorter than currently used to maintain vehicle separation. In this respect, we analyze a hopping strategy for Time-Slotted Channel-Hopping (TSCH), which was introduced in the IEEE 802.15.4e amendment with a view of improving the reliability of IEEE 802.15.4 networks. We define a probability framework to estimate the chance of successful hopping assuming two previously merged vehicles, and we design a zero-sum game and propose a payoff function to always place communicating nodes in a Nash equilibrium by choosing whether to hop or not, and therefore maximizing the communication throughput by mitigating jamming signals.

2017

Challenges in Migration from Waterfall to Agile Environments

Autores
Almeida, F;

Publicação
World Journal of Computer Application and Technology

Abstract

2017

Organization-based Multi-Agent structure of the Smart Home Electricity System

Autores
Gazafroudi, AS; Pinto, T; Castrillo, FP; Prieto, J; Corchado, JM; Jozi, A; Vale, ZA; Venayagamoorthy, GK;

Publicação
2017 IEEE Congress on Evolutionary Computation, CEC 2017, Donostia, San Sebastián, Spain, June 5-8, 2017

Abstract

2017

Mistrustful P2P: Deterministic privacy-preserving P2P file sharing model to hide user content interests in untrusted peer-to-peer networks

Autores
da Silva, PM; Dias, J; Ricardo, M;

Publicação
COMPUTER NETWORKS

Abstract
P2P networks endowed individuals with the means to easily and efficiently distribute digital media over the Internet, but user legal liability issues may be raised as they also facilitate the unauthorized distribution and reproduction of copyrighted material. Traditional P2P file sharing systems focus on performance and scalability, disregarding any privacy or legal issues that may arise from their use. Lacking alternatives, and unaware of the privacy issues that arise from relaying traffic of insecure applications, users have adopted anonymity systems for P2P file sharing. This work aims at hiding user content interests from malicious peers through plausible deniability. The Mistrustful P2P model is built on the concept of mistrusting all the entities participating in the P2P network, hence its name. It provides a deterministic and configurable privacy protection that relies on cover content downloads to hide user content interests, has no trust requirements, and introduces several mechanisms to prevent user legal liability and reduce network overhead while enabling timely content downloads. We extend previous work on the Mistrustful P2P model by discussing its legal and ethical framework, assessing its feasibility for more use cases, providing a security analysis, comparing it against a traditional P2P file sharing model, and further defining and improving its main mechanisms.

  • 1945
  • 4201