CIIC - Artigos em Revistas com Peer Review
Permanent URI for this collection
Browse
Browsing CIIC - Artigos em Revistas com Peer Review by Field of Science and Technology (FOS) "Ciências Naturais::Ciências da Computação e da Informação"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
- Elder care architecture - A physical and social approachPublication . Marcelino, Isabel; Barroso, João; Cruz, José Bulas; Pereira, AntónioAs we observe society in our days, we can see that people live longer; this means that we have an older population, more likely to have health issues. The special needs presented by the elderly are becoming a major concern for all of us, along with the lack of time demonstrated by society as a whole and, as a consequence, the lack of time is seen when families are not able to take care of their own elders. Many solutions are being presented in order to solve this problem. Some of them are taking advantage of the new technological developments in the body sensor networks area. In this paper we propose the architecture of a system called Elder Care. The Elder Care solution has two primary goals: monitoring vital signs, sending alerts to family and to specialized help and providing a social network in order to help end the elderly's social isolation.
- High dynamic range - a gateway for predictive ancient lightingPublication . Gonçalves, Alexandrino José Marques; Magalhães, Luís; Moura, João; Chalmers, AlanIn the last few years, the number of projects involving historical reconstruction has increased significantly. Recent technologies have proven a powerful tool for a better understanding of our cultural heritage through which to attain a glimpse of the environments in which our ancestors lived. However, to accomplish such a purpose, these reconstructions should be presented to us as they may really have been perceived by a local inhabitant, according to the illumination and materials used back then and, equally important, the characteristics of the human visual system. The human visual system has a remarkable ability to adjust itself to almost all everyday scenarios. This is particularly evident in extreme lighting conditions, such as bright light or dark environments. However, a major portion of the visible spectra captured by our visual system cannot be represented in most display devices. High dynamic range imagery is a field of research which is developing techniques to correct such inaccuracies. This new viewing paradigm is perfectly suited for archaeological interpretation, since its high contrast and chromaticity can present us with an enhanced viewing experience, closer to what an inhabitant of that era may have seen. In this article we present a case study of the reconstruction of a Roman site. We generate high dynamic range images of mosaics and frescoes from one of the most impressive monuments in the ruins of Conimbriga, Portugal, an ancient city of the Roman Empire. To achieve the requisite level of precision, in addition to having a precise geometric 3D model, it is crucial to integrate in the virtual simulation authentic physical data of the light used in the period under consideration. Therefore, in order to create a realistic physical-based environment, we use in our lighting simulations real data obtained from simulated Roman luminaries of that time.
- Illuminating the past: state of the artPublication . Happa, Jassim; Mudge, Mark; Debattista, Kurt; Artusi, Alessandro; Gonçalves, Alexandrino; Chalmers, AlanVirtual reconstruction and representation of historical environments and objects have been of research interest for nearly two decades. Physically based and historically accurate illumination allows archaeologists and historians to authentically visualise a past environment to deduce new knowledge. This report reviews the current state of illuminating cultural heritage sites and objects using computer graphics for scientific, preservation and research purposes. We present the most noteworthy and up-to-date examples of reconstructions employing appropriate illumination models in object and image space, and in the visual perception domain. Finally, we also discuss the difficulties in rendering, documentation, validation and identify probable research challenges for the future. The report is aimed for researchers new to cultural heritage reconstruction who wish to learn about methods to illuminate the past.
- An Integrated Cybernetic Awareness Strategy to Assess Cybersecurity Attitudes and Behaviours in School ContextPublication . Antunes, Mário; Silva, Carina; Marques, FredericoDigital exposure to the Internet among the younger generations, notwithstanding their digital abilities, has increased and raised the alarm regarding the need to intensify the education on cybersecurity in schools. Understanding of the human factor and its influence on children, namely their attitudes and behaviors online, is pivotal to reinforce their awareness towards cyberattacks, and to promote their digital citizenship. This paper aims to present an integrated cybersecurity and cyberawareness strategy composed of three major steps: (1) Cybersecurity attitude and behavior assessment, (2) self-diagnosis, and (3) teaching/learning activities. The following contributions are made: Two questionnaires to assess risky attitudes and behaviors regarding cybersecurity; a self-diagnosis to measure students’ skills on cybersecurity; a lesson plan addressing cyberawareness to be applied on Information and Communications Technology (ICT) and citizenship education curricular units. Cybersecurity risky attitudes and behaviors were evaluated in a junior high school population of 164 students attending the sixth and ninth grades. The assessment focused on two main subjects: To identify the attitudes and behaviors that raise the risk on cybersecurity among the participating students; to characterize the acquired students’ cybersecurity and cyberawareness skills. Global and individual scores and the histograms for attitudes and behaviors are presented. The items in which we have observed significant differences between sixth and ninth grades are depicted and quantified by their corresponding p-values obtained through the Mann–Whitney non-parametric test. Regarding the results obtained on the assessment of attitudes and behaviors, although positive, we observed that the attitudes and behaviors in ninth grade students are globally inferior compared to those attained by sixth grade students. The deployed strategy for cyberawareness was applied in a school context; however, the same approach is suitable to be applied in other types of organizations, namely enterprises, healthcare institutions and public sector.
- Log pseudonymization: Privacy maintenance in practicePublication . Varanda, Artur; Santos, Leonel; Costa, Rogério Luís de C.; Oliveira, Adail; Rabadão, CarlosMobile phones, social media, and Internet of Things (IoT) devices are examples of day-to-day technologies that collect large amounts of data, including people's location, habits, and preferences. The first regulations on digital data collection and processing privacy were created decades ago, but such an increased amount of collected digital data and the risks associated with the illegal processing and exposure of personal information led to several new regulations, including the European General Data Protection Regulation. Recent regulations require that personal data controllers implement several technical and organizational measures to protect data privacy. Much attention was given to data gathering, storage, and processing at system and database levels. But at the system administration level, log files usually store data that can lead to the identification of an individual, which means they must be processed to guarantee personal data privacy. In this work, we deal with pseudonymization. We discuss log sources, formats and data, log management architectures, and the log processing pipeline, considering pseudonymization and security requirements. We describe an architecture for log pseudonymization during the ingestion phase and present its implementation using Elasticsearch, Logstash, and Kibana, providing conclusions and helpful insights on log pseudonymization for privacy protection.
- Reconstruction and generation of virtual heritage sitesPublication . Rodrigues, Nuno; Magalhães, L.; Moura, J.; Chalmers, A.Traditionally procedural modelling techniques are commonly used to generate new structures and are presently established in several areas such as video games and computer animated movies. However they may also be used in heritage applications to efficiently produce models of non-existing worlds for which there is some kind of knowledge (e.g. floor plans, photographs) to support the reconstruction of realistic environments. Similarly they may also be used to support the generation of distinct possibilities that allow experts to draw some conclusions or conceive different hypotheses about lost worlds. The present paper shows the benefits and constraints that may arise from the use of such techniques in virtual heritage applications. Furthermore, a whole method is proposed, for the reconstruction and generation of virtual heritage traversable house models, provided through the means of a grammar, demonstrated with the reconstruction and generation of several Roman houses from the heritage site of Conimbriga, Portugal.
- Security Mechanisms of a Mobile Health Application for Promoting Physical Activity among Older AdultsPublication . Bastos, David; Ribeiro, José; Silva, Fernando; Rodrigues, Mário; Rabadão, Carlos; Fernández-Caballero, Antonio; Barraca, João Paulo; Rocha, Nelson Pacheco; Pereira, AntónioPhysical activity contributes to the maintenance of health conditions and functioning. However, the percentage of older adults who comply with the recommendations for physical activity levels is low when compared to the same percentages on younger groups. The SmartWalk system aims to encourage older adults to perform physical activity (i.e., walking in the city), which is monitored and adjusted by healthcare providers for best results. The study reported in this article focused on the implementation of SmartWalk security services to keep personal data safe during communications and while at rest, which were validated considering a comprehensive use case. The security framework offers various mechanisms, including an authentication system that was designed to complement the pairs of usernames and passwords with trusted execution environments and token-based features, authorization with different access levels, symmetric and asymmetric key cryptography, critical transactions review, and logging supported by blockchain technology. The resulting implementation contributes for a common understanding of the security features of trustful smart cities’ applications, which conforms with existing legislation and regulations.
