2023
Authors
Descalzi, O; Facao, M; Cartes, C; Carvalho, MI; Brand, HR;
Publication
CHAOS
Abstract
We investigate the properties of time-dependent dissipative solitons for a cubic complex Ginzburg-Landau equation stabilized by nonlinear gradient terms. The separation of initially nearby trajectories in the asymptotic limit is predominantly used to distinguish qualitatively between time-periodic behavior and chaotic localized states. These results are further corroborated by Fourier transforms and time series. Quasiperiodic behavior is obtained as well, but typically over a fairly narrow range of parameter values. For illustration, two examples of nonlinear gradient terms are examined: the Raman term and combinations of the Raman term with dispersion of the nonlinear gain. For small quintic perturbations, it turns out that the chaotic localized states are showing a transition to periodic states, stationary states, or collapse already for a small magnitude of the quintic perturbations. This result indicates that the basin of attraction for chaotic localized states is rather shallow.
2023
Authors
Malheiro, D; Facao, M; Carvalho, MI;
Publication
OPTICS LETTERS
Abstract
Dissipative quartic solitons have gained interest in the field of mode-locked lasers for their energy-width scaling which allows the generation of ultrashort pulses with high energies. Pursuing the characterization of such pulses, here we found soliton solutions of a distributed model for mode locked lasers in the presence of either positive or negative fourth-order dispersion (4OD). We studied the impact the laser parameters may have on the profiles, range of existence, and energy-width relation of the output pulses. The most energetic and narrowest solutions occur for negative 4OD, with the energy having an inverse cubic dependence with the width in most cases. Our simulations showed that the spectral filtering has the biggest contribution in the generation of short (widths as low as 39 fs) and very energetic (391 nJ) optical pulses.(c) 2023 Optica Publishing Group
2023
Authors
Fernandes, R; Bugla, S; Pinto, P; Pinto, A;
Publication
SENSORS
Abstract
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP). However, the MISP was considered limited if its information was deemed as classified or shared only for a given period of time. A solution using searchable encryption techniques that better control the sharing of information was previously proposed by the same authors. This paper describes a prototype implementation for two key functionalities of the previous solution, considering multiple entities sharing information with each other: the symmetric key generation of a sharing group and the functionality to update a shared index. Moreover, these functionalities are evaluated regarding their performance, and enhancements are proposed to improve the performance of the implementation regarding its execution time. As the main result, the duration of the update process was shortened from around 2922 s to around 302 s, when considering a shared index with 100,000 elements. From the security analysis performed, the implementation can be considered secure, thus confirming the secrecy of the exchanged nonces. The limitations of the current implementation are depicted, and future work is pointed out.
2023
Authors
Ferreira, IA; Godina, R; Pinto, A; Pinto, P; Carvalho, H;
Publication
COMPUTERS & INDUSTRIAL ENGINEERING
Abstract
The role of new technologies such as additive manufacturing and blockchain technology in designing and implementing circular economy ecosystems is not a trivial issue. This study aimed to understand if blockchain technology can be an enabler tool for developing additive symbiotic networks. A real case study was developed regarding a circular economy ecosystem in which a fused granular fabrication 3D printer is used to valorize polycarbonate waste. The industrial symbiosis network comprised four stakeholders: a manufacturing company that produces polycarbonate waste, a municipality service responsible for the city waste management, a start-up holding the 3D printer, and a non-profit store. It was identified a set of six requirements to adopt the blockchain technology in an additive symbiotic network, bearing in mind the need to have a database to keep track of the properties of the input material for the 3D printer during the exchanges, in addition to the inexistence of mechanisms of trust or cooperation between well-established industries and the additive manufacturing industry. The findings suggested a permissioned blockchain to support the implementation of the additive symbiotic network, namely, to enable the physical transactions (quantity and quality of waste material PC sheets) and monitoring and reporting (additive manufacturing technology knowledge and final product's quantity and price).Future research venues include developing blockchain-based systems that enhance the development of ad-ditive symbiotic networks.
2023
Authors
Torres, N; Chaves, A; Toscano, C; Pinto, P;
Publication
Communications in Computer and Information Science
Abstract
With the introduction of Industry 4.0 technological concepts, suppliers and manufacturers envision new or improved products and services, cost reductions, and productivity gains. In this context, data exchanges between companies in the same or different activity sectors are necessary, while assuring data security and sovereignty. Thus, it is crucial to select and implement adequate standards which enable the interconnection requirements between companies and also feature security by design. The International Data Spaces (IDS) is a current standard that provides data sharing through data spaces mainly composed of homogeneous rules, certified data providers/consumers, and reliability between partners. Implementing IDS in sectors such as textile and clothing is expected to open new opportunities and challenges. This paper proposes a prototype for the IDS Security Components in the Textile and Clothing Industry context. This prototype assures data sovereignty and enables the interactions required by all participants in this supply chain industry using secure communications. The adoption of IDS as a base model in this activity sector fosters productive collaboration, lowers entry barriers for business partnerships, and enables an innovation environment. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
2023
Authors
Javadpour, A; Sangaiah, AK; Jafari, F; Pinto, P; Memarzadeh-Tehran, H; Rezaei, S; Saghafi, F;
Publication
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Abstract
Monitoring security and quality of service is essential, due to the rapid growth of the number of nodes in wireless networks. In healthcare/industrial environments, especially in wireless body area networks (WBANs), this is even more important. Because the delays and errors can directly affect patients'/scientists' health. To increase the Monitoring Quality of Services (MQoS) in WBANs, a secure medium access control (MAC) protocol needs to be developed to provide optimal services. This article provides a comprehensive review of MAC protocols in WBANs with a technical security analysis approach. Time-based, contention-based, and hybrid protocols are compared in this article, regarding MQoS and their security vulnerabilities. We have considered delay, packet loss, and energy consumption as performance evaluation criteria in WBANs, which may be degraded under a cyberattack. This work shows that there is a research gap in the literature, which is the failure of covering security and privacy issues in the MAC layer protocols.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.