CIIC - Artigos em Revistas com Peer Review
URI permanente para esta coleção:
Navegar
Entradas recentes
- A simple heuristic for the identification of the case ID attribute in unlabelled process mining event logsPublication . Vicente, André; Grilo, Carlos; Rijo, Rui; Martinho, RicardoThis study addresses the critical challenge of identifying and labelling the case ID attribute in unlabelled event logs, a fundamental task in process mining. Case IDs uniquely associate events with individual process instances, enabling accurate analysis and discovery of operational insights. Manual identification of case IDs is error-prone and labour-intensive, often hindering the scalability and reliability of process mining analyses. This paper introduces a novel heuristic method that automates case ID identification, improving efficiency and accuracy for diverse real-world datasets. The proposed heuristic leverages unique temporal patterns observed in event logs to distinguish case ID attributes from other attributes. It calculates a weighted average of temporal spans and applies customisable parameters to prioritise relevant attributes. The method was validated using 27 datasets from the Business Process Intelligence (BPI) Challenge, representing a variety of industries and event log complexities. Performance metrics, including success rates and computational efficiency, were benchmarked against existing approaches. The heuristic achieved an 85.2% top-1 success rate, and remains effective provided at least one repeating categorical attribute is present - a condition met by virtually all publicly available business and industrial logs. It consistently ranked case IDs among the top attributes even in challenging scenarios, such as cyclic processes and multi-correlated data. The method demonstrated robustness across diverse datasets, processing large event logs within seconds, highlighting its practicality for real-world applications. This research contributes an innovative and explainable approach to case ID identification that requires only raw event logs, contrasting with existing methods reliant on pre-labelled data or complex pipelines. Its simplicity, efficiency, and adaptability to various process types make it a valuable tool for advancing process mining capabilities.
- Optimization of Anti-Spam Systems with Multiobjective Evolutionary AlgorithmsPublication . Basto-Fernandes, Vitor; Yevseyeva, Iryna; Méndez, José R.In this paper anti-spam filtering is presented as a cumbersome service, as opposed to a software product perspective. The huge human effort for setting up, adaptation, maintenance, and tuning of filters for spam detection in anti-spam systems is explained. Choosing the best importance scores for the spam filters is essential for the accuracy of any rules based anti-spam system, and is also one of the biggest challenges in this research area. Optimal filters score settings for Apache SpamAssassin project (the most widely adopted anti-spam open-source software) is addressed. In addition to a survey done on single/multi-objective optimization research in this area, we also present a study for filters score setting using multiobjective optimization based on two most representative evolutionary algorithms, NSGA II and SPEA2. Problem description, simulation and results analysis is done for SpamAssassin public mail corpus which is widely used for benchmarking purposes.
- Abordagem baseada em Algoritmos Genéticos para deteção de vulnerabilidades de SQL Injection em Aplicações Web PHPPublication . Baptista, Kevin; Bernardino, Anabela Moreira; Bernardino, Eugénia MoreiraHoje em dia, existe uma maior preocupação com a segurança no desenvolvimento de aplicações web. No entanto, ainda existem muitos ataques a este tipo de aplicações, perpetuados por hackers que se aproveitam das vulnerabilidades destas aplicações. Estas vulnerabilidades podem estar associadas a inúmeros fatores, desde configurações incorretas, falhas nas políticas de segurança, sistemas ou componentes desatualizados ou problemas diretamente associados ao código desenvolvido. Os ataques a aplicações web tem como resultado perda de informação privilegiada. Para mitigar este problema, existem varias ferramentas automatizadas que permitem auxiliar profissionais da área a identificar estas vulnerabilidades. No entanto, manter estas ferramentas atualizadas com a evolução tecnológica tem-se demonstrado um desafio. Neste artigo, propomos uma abordagem para detetar vulnerabilidades de SQL Injection no código-fonte de varias aplicações web PHP, usando Algoritmos Genéticos (AG). Os resultados obtidos mostram a eficiência do AG em relação a outras ferramentas existentes.
- Implementing a Pervasive Real-Time Intelligent System for Tracking Critical Events with Intensive Care PatientsPublication . Portela, Filipe; Gago, Pedro; Santos, Manuel Filipe; Machado, José; Abelha, António; Silva, Álvaro; Rua, FernandoNowadays, it is increasingly important to utilize intelligent systems to support the decision making process (DMP) in challenging areas such as Intensive Medicine. In Intensive Care Units (ICU), some of the biggest challenges relate both to the number and the different types of available data sources. Even though in such a setting the values for some variables are easy to collect, data collection is still performed manually in particular instances. In order to improve the DMP in ICU, a Pervasive Intelligent Decision Support System, called INTCare was deployed in the ICU of Centro Hospitalar do Porto in Portugal. This system altered the way information is collected and presented. Moreover, the tracking system deployed as a specific module of INTCare – Electronic Nursing Record (ENR) is made accessible anywhere and anytime. The system allows for the calculation of the critical events regarding five variables that are typically monitored in an ICU. Specifically, the INTCare tracking system characterizes a grid that shows the events by type and duration, empowers a warning system to alert the doctors and promotes intuitive graphics that allow care providers to follow the patient care journey. User acceptance was measured through a questionnaire designed in accordance with the Technology Acceptance Model (TAM) and results of implementing the INTCare tracking system, and its interface are reported.
- Optimization of shoe sole design according to individual feet pressure mapsPublication . Spahiu, Tatjana; Almeida, Henrique; Ascenso, Rita M. T.; Vitorino, Liliana; Marto, AnabelaInnovative technologies are shaping the future of product development in many industries. From the wide range of applications apparel industry as garments, footwear and accessories has involved advanced technologies in different steps of product development. The focus of companies is quality and fit of products, especially for footwear products, where fit is one of the most important elements for the wearer. This is strongly related with comfort and poor fit leads to foot injuries. Considering this fact, a case study of different steps for shoe designing according to individual foot shape will be presented. Taking into consideration the aesthetics of the sole and in a more sustainable view, through topological optimization reducing of material wastage for sole production will be presented. By means of the topological optimization in the shoe design process, sole optimization is realized. As a part of personalization, feet's plantar pressure maps taken from 3 participants gave a better explanation of weight distribution of each foot. Following, sole personalization according the plantar pressure maps for each foot gives the possibility to obtain the best least material design according to the feet's pressure while maintaining biomechanical performance and aesthetics.
- Distributed Architecture for Unmanned Vehicle ServicesPublication . Ramos, João; Ribeiro, Roberto; Safadinho, David; Barroso, João; Rabadão, Carlos; Pereira, AntónioThe demand for online services is increasing. Services that would require a long time to understand, use and master are becoming as transparent as possible to the users, that tend to focus only on the final goals. Combined with the advantages of the unmanned vehicles (UV), from the unmanned factor to the reduced size and costs, we found an opportunity to bring to users a wide variety of services supported by UV, through the Internet of Unmanned Vehicles (IoUV). Current solutions were analyzed and we discussed scalability and genericity as the principal concerns. Then, we proposed a solution that combines several services and UVs, available from anywhere at any time, from a cloud platform. The solution considers a cloud distributed architecture, composed by users, services, vehicles and a platform, interconnected through the Internet. Each vehicle provides to the platform an abstract and generic interface for the essential commands. Therefore, this modular design makes easier the creation of new services and the reuse of the different vehicles. To confirm the feasibility of the solution we implemented a prototype considering a cloud-hosted platform and the integration of custom-built small-sized cars, a custom-built quadcopter, and a commercial Vertical Take-Off and Landing (VTOL) aircraft. To validate the prototype and the vehicles’ remote control, we created several services accessible via a web browser and controlled through a computer keyboard. We tested the solution in a local network, remote networks and mobile networks (i.e., 3G and Long-Term Evolution (LTE)) and proved the benefits of decentralizing the communications into multiple point-to-point links for the remote control. Consequently, the solution can provide scalable UV-based services, with low technical effort, for anyone at anytime and anywhere.
- Web AR Solution for UAV Pilot Training and Usability TestingPublication . Ribeiro, Roberto; Ramos, João; Safadinho, David; Reis, Arsénio; Rabadão, Carlos; Barroso, João; Pereira, AntónioData and services are available anywhere at any time thanks to the Internet and mobile devices. Nowadays, there are new ways of representing data through trendy technologies such as augmented reality (AR), which extends our perception of reality through the addition of a virtual layer on top of real-time images. The great potential of unmanned aerial vehicles (UAVs) for carrying out routine and professional tasks has encouraged their use in the creation of several services, such as package delivery or industrial maintenance. Unfortunately, drone piloting is difficult to learn and requires specific training. Since regular training is performed with virtual simulations, we decided to propose a multiplatform cloud-hosted solution based in Web AR for drone training and usability testing. This solution defines a configurable trajectory through virtual elements represented over barcode markers placed on a real environment. The main goal is to provide an inclusive and accessible training solution which could be used by anyone who wants to learn how to pilot or test research related to UAV control. For this paper, we reviewed drones, AR, and human–drone interaction (HDI) to propose an architecture and implement a prototype, which was built using a Raspberry Pi 3, a camera, and barcode markers. The validation was conducted using several test scenarios. The results show that a real-time AR experience for drone pilot training and usability testing is achievable through web technologies. Some of the advantages of this approach, compared to traditional methods, are its high availability by using the web and other ubiquitous devices; the minimization of technophobia related to crashes; and the development of cost-effective alternatives to train pilots and make the testing phase easier for drone researchers and developers through trendy technologies.
- Perceptual images of Conimbriga using High Dynamic RangePublication . Gonçalves, Alexandrino; Moura, João Paulo; Magalhães, Luís; Chalmers, AlanIt is widely recognized that new technologies can play an important role in the interpretation of our cultural heritage legacy. This has become a powerful tool providing a better understanding of our past, and thereby, allowing us to attain a glimpse of the environments in which our ancestors lived. In this domain, the way we see such reconstructed environments is particularly important in order to establish an accurate interpretation of that historical setting. However, the desired visual accuracy in the representation of any archaeological scenario is strictly related to the technology used to visualize it. High Dynamic Range (HDR) technology encompasses the capacity to produce visual results similar to the visual acuity of the human eye, particularly in extreme lighting conditions, such as bright light or dim environments. In this paper we present an ancient flame light simulation method and a perceptual visual user study with HDR images of Roman mosaics and frescoes, illuminated by luminaries of that period, located in one of the most impressive monuments in the ruins of Conimbriga, Portugal. With this work we intend to demonstrate how the use of this particular low intensity Roman light, when compared to other modern illumination, affects the subjects’ perception of ancient artefacts and influences the scenario viewing pattern.
- Swarm optimisation algorithms applied to large balanced communication networksPublication . Bernardino, Eugénia Moreira; Bernardino, Anabela Moreira; Sánchez-Pérez, Juan Manuel; Pulido, Juan Antonio Gómez; Rodríguez, Miguel A. VegaIn the last years, several combinatorial optimisation problems have arisen in the computer communications networking field. In many cases, for solving these problems it is necessary the use of metaheuristics. An important problem in communication networks is the Terminal Assignment Problem (TAP). Our goal is to minimise the link cost of large balanced communication networks. TAP is a NP-Hard problem. The intractability of this problem is the motivation for the pursuits of Swarm Intelligence (SI) algorithms that produce approximate, rather than exact, solutions. This paper makes a comparison among the effectiveness of three SI algorithms: Ant Colony Optimisation, Discrete Particle Swarm Optimisation and Artificial Bee Colony. We also compare the SI algorithms with several algorithms from literature. Simulation results verify the effectiveness of the proposed algorithms. The results show that SI algorithms provide good solutions in a better running time.
- Corrigendum to “A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification” [Applied Soft Computing Volume 48 (2016) 111–123]Publication . Basto-Fernandes, Vitor; Yevseyeva, Iryna; Méndez, José R.; Zhao, Jiaqi; Fdez-Riverola, Florentino; Emmerich, Michael T. M.
