Logo do repositório
 

CIIC - Publicações em Atas de Conferências com Peer Review

URI permanente para esta coleção:

Navegar

Entradas recentes

A mostrar 1 - 10 de 93
  • Integrating a Head-mounted Display with a Mobile Device for Real-time Augmented Reality Purposes
    Publication . Madeira, Bruno; Alves, Pedro; Marto, Anabela; Rodrigues, Nuno; Gonçalves, Alexandrino
    Following the current technological growth and subsequent needs felt by industries, new processes should be adopted to make tasks simpler. Using Augmented Reality in conjunction with other technologies, it is possible to develop innovative solutions that aim to alleviate the difficulty of certain processes in the industry, or to reduce the time of their execution. This article addresses one of the possible applications of new technologies in the industry, using devices that allow the use of Augmented Reality without requiring much or no physical interaction by workers or causing many distractions, thus giving relevant information to the work to be performed without interfering with the quality of it. It will focus, more precisely, on integrating the Head-Mounted Display Moverio BT-35E with a mobile device and in describing the needed configurations for preparing this device to show information to warehouse operators, using Augmented Reality, provided by a software that runs on a capable device, discussing also what are the main mishaps discovered with the use of this device.
  • The regression analysis of the data to determine the buffer size when serving a self-similar packets flow
    Publication . Linets, Gennadiy; Voronkin, Roman; Govorova, Svetlana; Palkanov, Ilya; Grilo, Carlos
    Using the methods of regression analysis on the basis of simulation data, a model for predicting the queue size of the input self-similar packet flow, distributed according to the Pareto law when it is transformed into a flow having an exponential distribution, is constructed. Since the amount of losses in the general case does not give any information about the efficiency of using the buffer memory space in the process of transforming a self-similar packet flow, a quality metric (penalty) was introduced to get the quality of the models after training, which is a complex score. This criterion considers both packet loss during functional transformations and ineffective use of the buffer space in switching nodes. The choice of the best model for predicting the queue size when servicing a self-similar packet flow was carried out using the following characteristics: the coefficient of determination; root-mean-square regression error; mean absolute error; the penalty score. The best in terms of the investigated characteristics are the models using the isotonic regression and the support vector regression.
  • EasyBDI: Near Real-Time Data Analytics over Heterogeneous Data Sources
    Publication . Silva, Bruno; Moreira, José; Costa, Rogério Luís de C.
    The large volume of currently available data creates several opportunities for sciences and industry, especially with the application of data analytics. But also raises challenges that make unfeasible the use of batch-based ETL processes. Indeed, near real-time data analytics is a requirement in several domains as an alternative to traditional data warehouses. In the last years, big data platforms have been developed to enable query execution over distributed data sources. However, they do not deal with subject-oriented analysis, do not provide data distribution transparency, or do not assist with schema mapping and integration. In this demonstration, we present EasyBDI. It's a near real-time big data analytics prototype that enables users to run queries over heterogeneous data sources based on global logical abstractions created by the system and provides some usual concepts of data warehouse systems, like facts and dimensions. We use two motivating scenarios, one based on three years of real data on photovoltaic energy production and consumption, and the other based on the SSB+ benchmark. We will also present implementation challenges, issues, solutions, and insights.
  • Reconstructing Conimbriga - Digital Cantaber
    Publication . Ferreira, César; Rodrigues, Nuno; Gonçalves, Alexandrino; Hipólito-Correia, Virgílio
    Being the ancient cultural heritage structures and artefacts so full of detail and relevance to studies related to our past, it would be desirable to have precise virtual replicas that could be freely explored without endangering important pieces of history. However, the costs to produce three-dimensional environments are sometimes discouraging, due to the significant cost of some 3D authoring tools, and to the time necessary to manually produce the models. This paper presents a low-cost alternative to the classic manual modelling process, towards the production of highly detailed virtual models, by using open source software and a lowcost moving depth camera. The ambition is the dissemination of our cultural heritage legacy, making it accessible, not only to experts, but also to the general public, without requiring any high-performance hardware, authoring software or professional 3D skills. For the visualization, our virtual reconstructions will be available through a three-dimensional live model viewer, based on recent technologies such as HTML5 and WebGL. Those may be triggered from a wide variety of device, contributing in this way to a true democratization of history knowledge. The proposed approach was applied to create a virtual model of the so-called "House of Cantaber".
  • A Customizable Web Platform to Manage Standards Compliance of Information Security and Cybersecurity Auditing
    Publication . Antunes, Mário; Maximiano, Marisa; Gomes, Ricardo
    Information security and cybersecurity are key subjects in modern enterprises' management, being ISO-27001:2013, NIST Cybersecurity Framework and ISO-27009 some of the most implemented international frameworks and standards. Their main goal is to globally reduce the risk, by leveraging enterprises' competitiveness in global markets and enhancing business processes and collaborators' cyber awareness. Auditing processes examine and assess a list of predefined controls. For each control, a set of corrective measures could be proposed, to increase its compliance with the standard being used. These processes are time-consuming, involve on-site intervention by specialized consulting teams on the intervened enterprises, and a set of status reports of all the interventions should be elaborated and delivered. The existing auditing information systems are not developed to meet Small and Medium-sized Enterprises (SME) requirements, as they are mostly proprietary and expensive, ground usually on off-the-shelf applications, and are not generic to be used by several standards with different checklists and auditing methodologies. In this paper, a generic and web-integrated cybersecurity auditing information system is described. Its architecture, design, and data model enable it to be used in a wide set of auditing processes, by loading a predefined controls checklist assessment and their corresponding mitigation tasks list. It was designed to meet both SMEs and large enterprises' requirements, and stores auditing and intervention-related data in a relational database. The information system was tested on an ISO-27001:2013 information security auditing project, which has integrated fifty SMEs. The results obtained during the project are promising and reveal the appropriateness of using this information system in further similar auditing processes.
  • Exploring SQL injection vulnerabilities using artificial bee colony
    Publication . Baptista, Kevin; Bernardino, Anabela; Bernardino, Eugénia
    Over the last couple of decades, there has been an enormous growth in technologies and services available on the internet. This growth must take security into account, although due to the increase in complexity of systems this is not an easy task. Nowadays, hardly any organization may say with certainty that their system is secure. The Open Web Application Security listed “Injection” as the most security risk for web applications in 2020. There are many automated tools to assist professionals in the field, in order to identify this vulnerability. However, keeping these tools up to date has proven to be a challenge. Therefore, there has been some interest in applying Artificial Intelligence (AI) in this field. In this paper, we propose an approach to detect SQL injection vulnerabilities in the source code, using Artificial Bee Colony (ABC).
  • Forensic Analysis of Tampered Digital Photos
    Publication . Ferreira, Sara; Antunes, Mário; Correia, Manuel E.
    Deepfake in multimedia content is being increasingly used in a plethora of cybercrimes, namely those related to digital kidnap, and ransomware. Criminal investigation has been challenged in detecting manipulated multimedia material, by applying machine learning techniques to distinguish between fake and genuine photos and videos. This paper aims to present a Support Vector Machines (SVM) based method to detect tampered photos. The method was implemented in Python and integrated as a new module in the widely used digital forensics application Autopsy. The method processes a set of features resulting from the application of a Discrete Fourier Transform (DFT) in each photo. The experiments were made in a new and large dataset of classified photos containing both legitimate and manipulated photos, and composed of objects and faces. The results obtained were promising and reveal the appropriateness of using this method embedded in Autopsy, to help in criminal investigation activities and digital forensics.
  • Preface
    Publication . Rodrigues, Nuno; Mendes, Daniel
    Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
  • Defining Semantic Meta-hashtags for Twitter Classification
    Publication . Costa, Joana; Silva, Catarina; Antunes, Mário; Ribeiro, Bernardete
    Given the wide spread of social networks, research efforts to retrieve information using tagging from social networks communications have increased. In particular, in Twitter social network, hashtags are widely used to define a shared context for events or topics. While this is a common practice often the hashtags freely introduced by the user become easily biased. In this paper, we propose to deal with this bias defining semantic meta-hashtags by clustering similar messages to improve the classification. First, we use the user-defined hashtags as the Twitter message class labels. Then, we apply the meta-hashtag approach to boost the performance of the message classification. The meta-hashtag approach is tested in a Twitter-based dataset constructed by requesting public tweets to the Twitter API. The experimental results yielded by comparing a baseline model based on user-defined hashtags with the clustered meta-hashtag approach show that the overall classification is improved. It is concluded that by incorporating semantics in the meta-hashtag model can have impact in different applications, e.g. recommendation systems, event detection or crowdsourcing.
  • Health Literacy of the Polytechnic of Leiria Students
    Publication . Ascenso, Rita Margarida Teixeira; Dias, Sara Simões; Luis, Luis; Gonçalves, Dulce
    Health Literacy (HL) has several definitions and numerous HL assessment tools. Several systematic reviews on HL identified tools for HL assessment. Health Literacy Survey with 47 questions (HLS-EU-Q47) for Europe was adapted for 16 questions (HLS-EU-Q16), and for only 6 questions (HLS-EU-Q6). These are already in Portuguese and have been used to assess HL since 2017. The studies involved the Portuguese population, and recently, in 2021, the HL evaluation in university students identified limitations in HL. The HLS-EU-Q16_Pt used showed adequate internal consistency (Cronbach's alpha = 0.778, [0.737, 0.816]). Among 251 students from the Polytechnic of Leiria there was a statistically significant association of HL scores with the health area, and more evident when students had a previous degree in health.