2024
Authors
Monteiro, P; Lino, J; Araújo, RE; Costa, L;
Publication
EAI Endorsed Trans. Energy Web
Abstract
In this paper, the performance analysis of Machine Learning (ML) algorithms for fault analysis in photovoltaic (PV) plants, is given for different algorithms. To make the comparison more relevant, this study is made based on a real dataset. The goal was to use electric and environmental data from a PV system to provide a framework for analysing, comparing, and discussing five ML algorithms, such as: Multilayer Perceptron (MLP), Decision Tree (DT), K-Nearest Neighbors (KNN), Support Vector Machine (SVM) and Light Gradient Boosting Machine (LightGBM). The research findings suggest that an algorithm from the Gradient Boosting family called LightGBM can offer comparable or better performance in fault diagnosis for PV system.
2024
Authors
Dionísio, RP; Rosa, AR; Jesus, CSDS;
Publication
Lecture Notes in Networks and Systems
Abstract
Falls are one of the causes of severe hilliness among elders, and the COVID-19 pandemic increased the number of unattended cases because of the social distancing measures. This study aims to create a dataset that collects the data from a 3-axis acceleration sensor fixed on a hinged board apparatus that mimics a human fall event. The datalogging system uses off-the-shelf devices to measure, collect and store the data. The resulting dataset includes data from different angle positions and heights, corresponding to joints of the lower limbs of the human body (ankle, knee, and hip). We use the dataset with a threshold-based fall detection algorithm. The result from the Receiver Operating Characteristic curve shows a good behavior with a mean Area Under the Curve of 0.77 and allow to compute a best threshold value with False Positive Rate of 14.8% and True Positive rate of 89.1%. The optimal threshold value may vary depending on the specific population, activity patterns, and environmental conditions, which may require further customization and validation in real-world settings. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
2024
Authors
Almeida, JB; Olmos, SA; Barbosa, M; Barthe, G; Dupressoir, F; Grégoire, B; Laporte, V; Lechenet, JC; Low, C; Oliveira, T; Pacheco, H; Quaresma, M; Schwabe, P; Strub, PY;
Publication
ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II
Abstract
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST. The proof is machine-checked in EasyCrypt and it includes: 1) A formalization of the correctness (decryption failure probability) and IND-CPA security of the Kyber base public-key encryption scheme, following Bos et al. at Euro S&P 2018; 2) A formalization of the relevant variant of the Fujisaki-Okamoto transform in the Random Oracle Model (ROM), which follows closely (but not exactly) Hofheinz, Hovelmanns and Kiltz at TCC 2017; 3) A proof that the IND-CCA security of the ML-KEM specification and its correctness as a KEM follows from the previous results; 4) Two formally verified implementations of ML-KEM written in Jasmin that are provably constant-time, functionally equivalent to the ML-KEM specification and, for this reason, inherit the provable security guarantees established in the previous points. The top-level theorems give self-contained concrete bounds for the correctness and security of ML-KEM down to (a variant of) Module-LWE. We discuss how they are built modularly by leveraging various EasyCrypt features.
2024
Authors
Sant'Ana, H; Paredes, H; Barbosa, L; Rodrigues, NF;
Publication
2024 IEEE 12TH INTERNATIONAL CONFERENCE ON SERIOUS GAMES AND APPLICATIONS FOR HEALTH, SEGAH 2024
Abstract
The Web of Things (WoT) is an essential component within the Internet of Things (IoT) domain, offering a standardized method for describing, consuming, and orchestrating the functions of IoT devices. WoT plays a crucial role in promoting interoperability and streamlining the development of applications for IoT solutions. Recent research focusing on IoT solutions for ambient assisted living (AAL) has highlighted WoT as a key framework for integrating diverse smart devices and services to enhance the quality of life for older adults and individuals with specific health conditions. However, a closer look at recent literature reviews reveals a deficiency in comprehensive research regarding the interplay between WoT, AAL, and the health and wellbeing of older adults. To address this question, a comprehensive mapping review is performed to delve into the existing literature and pinpoint the most pertinent themes and topics within WoT. This analysis aims to uncover evidence of the correlation between WoT, AAL, and active and healthy aging (AHA) to support future research in this area.
2024
Authors
Teixeira, C; Gomes, I; Cunha, L; Soares, C; van Rijn, JN;
Publication
Progress in Artificial Intelligence - 23rd EPIA Conference on Artificial Intelligence, EPIA 2024, Viana do Castelo, Portugal, September 3-6, 2024, Proceedings, Part II
Abstract
As machine learning technologies are increasingly adopted, the demand for responsible AI practices to ensure transparency and accountability grows. To better understand the decision-making processes of machine learning models, GASTeN was developed to generate realistic yet ambiguous synthetic data near a classifier’s decision boundary. However, the results were inconsistent, with few images in the low-confidence region and noise. Therefore, we propose a new GASTeN version with a modified architecture and a novel loss function. This new loss function incorporates a multi-objective measure with a Gaussian loss centered on the classifier probability, targeting the decision boundary. Our study found that while the original GASTeN architecture yields the highest Fréchet Inception Distance (FID) scores, the updated version achieves lower Average Confusion Distance (ACD) values and consistent performance across low-confidence regions. Both architectures produce realistic and ambiguous images, but the updated one is more reliable, with no instances of GAN mode collapse. Additionally, the introduction of the Gaussian loss enhanced this architecture by allowing for adjustable tolerance in image generation around the decision boundary. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
2024
Authors
Narciso, D; Melo, M; Rodrigues, S; Dias, D; Cunha, J; Vasconcelos Raposo, J; Bessa, M;
Publication
VIRTUAL REALITY
Abstract
The advantages of Virtual Reality (VR) over traditional training, together with the development of VR technology, have contributed to an increase in the body of literature on training professionals with VR. However, there is a gap in the literature concerning the comparison of training in a Virtual Environment (VE) with the same training in a Real Environment (RE), which would contribute to a better understanding of the capabilities of VR in training. This paper presents a study with firefighters (N = 12) where the effect of a firefighter training exercise in a VE was evaluated and compared to that of the same exercise in a RE. The effect of environments was evaluated using psychophysiological measures by evaluating the perception of stress and fatigue, transfer of knowledge, sense of presence, cybersickness, and the actual stress measured through participants' Heart Rate Variability (HRV). The results showed a similar perception of stress and fatigue between the two environments; a positive, although not significant, effect of the VE on the transfer of knowledge; the display of moderately high presence values in the VE; the ability of the VE not to cause symptoms of cybersickness; and finally, obtaining signs of stress in participants' HRV in the RE and, to a lesser extent, signs of stress in the VE. Although the effect of the VE was shown to be non-comparable to that of the RE, the authors consider the results encouraging and discuss some key factors that should be addressed in the future to improve the results of the training VE.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.