Unidade de Investigação - CIIC - Computer Science and Communication Research Centre
URI permanente desta comunidade:
Navegar
Percorrer Unidade de Investigação - CIIC - Computer Science and Communication Research Centre por Domínios Científicos e Tecnológicos (FOS) "Ciências Naturais::Ciências da Computação e da Informação"
A mostrar 1 - 10 de 38
Resultados por página
Opções de ordenação
- 802.21-MPA-IMS ArchitecturePublication . Rodrigues, Carlos Miguel de Jesus; Rabadão, Carlos; Pereira, AntónioMobility has become a keyword nowadays with the evolution of mobile devices market and proliferation of realtime services. IP Multimedia Subsystem (IMS) is a single, standardized service framework that supports voice, video, data and messaging services, but does not provide seamless mobility for packet based sessions. This paper purposes an IMS architecture with IEEE 802.21 and media-independent pre-authentication (MPA) integrated. IEEE 802.21 can enable this seamless mobility in IMS and, additionally, MPA provides a secure handover optimization scheme, reducing, as a consequence, handover latency. The main goal of this architecture is to provide seamless and secure handovers between different access technologies in an IMS-based environment.
- Automatic Transcription of Polyphonic Piano Music Using Genetic Algorithms, Adaptive Spectral Envelope Modeling, and Dynamic Noise Level EstimationPublication . Reis, Gustavo; Fernandez de Vega, Francisco; Ferreira, AníbalThis paper presents a new method for multiple fundamental frequency (F0) estimation on piano recordings. We propose a framework based on a genetic algorithm in order to analyze the overlapping overtones and search for the most likely F0 combination. The search process is aided by adaptive spectral envelope modeling and dynamic noise level estimation: while the noise is dynamically estimated, the spectral envelope of previously recorded piano samples (internal database) is adapted in order to best match the piano played on the input signals and aid the search process for the most likely combination of F0s. For comparison, several state-of-the-art algorithms were run across various musical pieces played by different pianos and then compared using three different metrics. The proposed algorithm ranked first place on Hybrid Decay/Sustain Score metric, which has better correlation with the human hearing perception and ranked second place on both onset-only and onset–offset metrics. A previous genetic algorithm approach is also included in the comparison to show how the proposed system brings significant improvements on both quality of the results and computing time.
- Blind Guide: An Ultrasound Sensor-based Body Area Network for Guiding Blind PeoplePublication . Pereira, António; Nunes, Nelson; Vieira, Daniel; Costa, Nuno; Fernandes, Hugo; Barroso, JoãoWireless Sensor Networks, in particular Wireless Body Area Networks, is a technology suggested by the research community as allowing elderly people, or people with some kind of disability, to live in a safer, responsive and comfortable environment while at their homes. One of the most active threats to the autonomous life of blind people is the quantity and variety of obstacles they face while moving, whether they are obstacles in the footpath or obstacles coming out from the walls of buildings. Hence, it is necessary to develop a solution that helps or assists blind people while moving either in indoor or outdoor scenarios, simultaneously allowing the use of the use of white cane or the Seeing Eye dog. In this article, the authors propose the use of an ultra-sound based body area network for obstacle detection and warning as a complementary and effective solution for aiding blind people when moving from place to place. According to the cost estimates of the solution and to the negligible setup time, this could be a real effective complementary solution for blind people.
- A Dataset of Photos and Videos for Digital Forensics Analysis Using Machine Learning ProcessingPublication . Ferreira, Sara; Antunes, Mário; Correia, Manuel E.Deepfake and manipulated digital photos and videos are being increasingly used in a myriad of cybercrimes. Ransomware, the dissemination of fake news, and digital kidnapping-related crimes are the most recurrent, in which tampered multimedia content has been the primordial disseminating vehicle. Digital forensic analysis tools are being widely used by criminal investigations to automate the identification of digital evidence in seized electronic equipment. The number of files to be processed and the complexity of the crimes under analysis have highlighted the need to employ efficient digital forensics techniques grounded on state-of-the-art technologies. Machine Learning (ML) researchers have been challenged to apply techniques and methods to improve the automatic detection of manipulated multimedia content. However, the implementation of such methods have not yet been massively incorporated into digital forensic tools, mostly due to the lack of realistic and well-structured datasets of photos and videos. The diversity and richness of the datasets are crucial to benchmark the ML models and to evaluate their appropriateness to be applied in real-world digital forensics applications. An example is the development of third-party modules for the widely used Autopsy digital forensic application. This paper presents a dataset obtained by extracting a set of simple features from genuine and manipulated photos and videos, which are part of state-of-the-art existing datasets. The resulting dataset is balanced, and each entry comprises a label and a vector of numeric values corresponding to the features extracted through a Discrete Fourier Transform (DFT). The dataset is available in a GitHub repository, and the total amount of photos and video frames is 40, 588 and 12, 400, respectively. The dataset was validated and benchmarked with deep learning Convolutional Neural Networks (CNN) and Support Vector Machines (SVM) methods; however, a plethora of other existing ones can be applied. Generically, the results show a better F1-score for CNN when comparing with SVM, both for photos and videos processing. CNN achieved an F1-score of 0.9968 and 0.8415 for photos and videos, respectively. Regarding SVM, the results obtained with 5-fold cross-validation are 0.9953 and 0.7955, respectively, for photos and videos processing. A set of methods written in Python is available for the researchers, namely to preprocess and extract the features from the original photos and videos files and to build the training and testing sets. Additional methods are also available to convert the original PKL files into CSV and TXT, which gives more flexibility for the ML researchers to use the dataset on existing ML frameworks and tools.
- Os Desafios Web no Processo Formativo - O Caso de Estudo da humansoftPublication . Sousa, Mayelson de; Gonçalves, AlexandrinoA constante evolução das tecnologias web tem originado o aparecimento de plataformas que facilitam a gestão das tarefas dos utilizadores nos dias de hoje. No sentido de maximizar a satisfação do cliente e disporem de soluções de acordo com os padrões de atuais do mercado, as empresas devem adaptar os seus produtos, com particular enfoque nas soluções web-based, com vista a potenciar a usabilidade e a fluidez do seu uso. Neste sentido, este artigo apresenta um caso de estudo real, de desenvolvimento web na empresa humansoft, onde foram desenvolvidos diversos módulos relativos aos dois principais produtos da empresa, o humantrain, que é um sistema de gestão do processo formativo, e o humanportal, que é uma aplicação web que permite a interoperabilidade entre o humantrain e a web. Ambas as aplicações permitem às entidades formadoras e/ou empresas rentabilizarem a gestão dos seus recursos tanto ao nível pedagógico como financeiros.
- Discrete Compound Tests and Dorfman’s Methodology in the Presence of MisclassificationPublication . Santos, Rui; Martins, João Paulo; Felgueiras, MiguelCompound tests can be used to save resources for classification or estimation purposes in clinical trials and quality control. Nevertheless, the methodologies that are usually applied are restricted to qualitative group tests. Moreover, when quantitative compound tests are applied the problem is to ascertain whether the amount of some substance of any individual in the group is greater or lower than a prefixed threshold. An overview of the applications of the discrete compound tests highlights the advantages (to save resources) and disadvantages (higher probability of misclassification), and suggests criteria to assess the suitability of applying Dorfman’s methodology.
- An easy-to-use tool to inject DoS and spoofing networking attacksPublication . Almeida, Rafaela; Pacheco, Vasco; Antunes, Mário; Frazão, LuísComputer network attacks are vast and negatively impact the infrastructure and its applicational services. From a cyber offensive and defensive perspective, there are a plethora of tools to craft and inject customized malicious packets in the network and exploit operating systems and application vulnerabilities. Those tools are however hard to operate by practitioners with less knowledge on networking fundamentals and students in the early stage of their studies. This paper proposes an easy-to-use application tool that can produce customized Denial of Service (DoS) and spoofing attacks. It was developed in Python and takes advantage of scapy library to process and inject network packets. A set of experiments was made, and the results obtained show the efficiency and accuracy of the attacks, by impairing the proper functioning of the victim's machines.
- Elder care architecture - A physical and social approachPublication . Marcelino, Isabel; Barroso, João; Cruz, José Bulas; Pereira, AntónioAs we observe society in our days, we can see that people live longer; this means that we have an older population, more likely to have health issues. The special needs presented by the elderly are becoming a major concern for all of us, along with the lack of time demonstrated by society as a whole and, as a consequence, the lack of time is seen when families are not able to take care of their own elders. Many solutions are being presented in order to solve this problem. Some of them are taking advantage of the new technological developments in the body sensor networks area. In this paper we propose the architecture of a system called Elder Care. The Elder Care solution has two primary goals: monitoring vital signs, sending alerts to family and to specialized help and providing a social network in order to help end the elderly's social isolation.
- Elder Care Modular SolutionPublication . Marcelino, Isabel; Pereira, António Manuel de JesusThe Elder Care solution has two primary goals: monitoring vital signs, sending alerts to family and specialized help and provide a social network in order to wrap all older population to avoid social isolation [1][2]. In this paper we will show the methodology used to obtain Elder Care's architecture and point some guidelines to our present work: Elder Care's implementation.
- An end-to-end cryptography based real-time chatPublication . Melo, Tiezer; Barros, António; Antunes, Mário; Frazão, LuísConfidentiality protects users' data from digital eavesdroppers when traveling through the Internet. Confidentiality is complex and costly, especially on applications that involve communication and data exchange between multiple users. Cryptography has been the most used medium to achieve confidentiality, being the greatest challenge the sharing of a secret key to a group of people in a safe and effective way. This paper presents a chat application that implements an innovative way of sending messages with end-to-end encryption, in real-time, with a dynamic key store, and without the existence of data persistence. The application stands out from the others by the fact that it innovates the way the keys are shared with multiple users.
