Entity

Time filter

Source Type


Gomes L.,New University of Lisbon | Gomes L.,Institute Desenvolvimento Of Novas Tecnologias | Lourenco J.,Empresa de Investigacao e Desenvolvimento de Electronica EID
IEEE Transactions on Industrial Electronics | Year: 2010

This paper describes a tool framework allowing the rapid prototyping of an animated synoptic application associated with an embedded system controller. The motto for developing this tool framework is to be able to automatically generate controllers with associated graphical user interface (GUI) without writing a line of execution code; instead, the tool framework will provide specific aids allowing the designer to define the controller behavior and associated GUI (including static parts and intended dynamics). The behavior of the controller is described through a low-level Petri-net model, and the tool framework supports the definition of characteristics for the intended GUI and the association of the characteristics of the Petri-net behavioral model with specific characteristics of the GUI through a set of dedicated rules. Two main tools are described. The first one, named as Animator, allows an interactive definition of the graphical characteristics of the synoptic and automatic code generation. The second one, named as Synoptic, is responsible for the embedded control-execution part, integrating real-time updating of the GUI. The application of the tool framework to a simple automation system, namely, to the controller of a manufacturing system composed of a four-cell first-infirst-out system, is presented. © 2006 IEEE. Source


Montezuma P.,New University of Lisbon | Montezuma P.,Telecommunications Institute of Portugal | Montezuma P.,Institute Desenvolvimento Of Novas Tecnologias | Dinis R.,New University of Lisbon | Dinis R.,Telecommunications Institute of Portugal
Proceedings - International Conference on Computer Communications and Networks, ICCCN | Year: 2015

In wireless communication systems privacy among users contents is a crucial security requirement such as power and spectral efficiency. Spectral and power efficiencies are attainable with power efficient transmission schemes where constellations are decomposed into several BPSK (Bi Phase Shift Keying), being each one amplified and transmitted independently by an antenna. Besides that, due to constellation shaping on the desired transmission direction performed by these transmitters, some kind of physical layer security is assured as well. Under this approach, security is achieved by constellation shaping of the transmitted constellation since each user must know the transmitter configuration parameters associated to the constellation shaping, i.e., the direction in which the constellation is optimized, otherwise the received data would be meaningless. Commonly, security is assured by encrypted algorithms implemented by higher layers, such as private and public encrypted keys. However, system security can be improved with physical layer security schemes since they can be complemented with other security schemes from higher layers. Simulation results show the effectiveness of the proposed approach. © 2015 IEEE. Source


Montezuma P.,New University of Lisbon | Montezuma P.,Telecommunications Institute of Portugal | Montezuma P.,Institute Desenvolvimento Of Novas Tecnologias | Dinis R.,New University of Lisbon | Dinis R.,Telecommunications Institute of Portugal
2015 IEEE 82nd Vehicular Technology Conference, VTC Fall 2015 - Proceedings | Year: 2015

Mobile communication systems must support multiple users achieving at same time privacy. Thus security is a crucial requirement to assure privacy of the data transmitted from and for each user. Several solutions can be adopted to implement security. Commonly they are based on encrypted algorithms implemented by higher layers, such as private and public encrypted keys. Also security can be implemented at physical layer and complemented with other security schemes from higher layers. Directivity introduced at the transmitted constellation can be also used to assure some kind of physical layer security. This is the case of power efficient transmission schemes where constellations are decomposed into several BPSK (Bi-Phase Shift Keying), being each one amplified and transmitted independently by an antenna. It can be shown that privacy among user contents is achieved under this approach, since each user must know the transmitter parameters associated to the constellation shaping, i.e., the direction in which the constellation is optimized, otherwise receives a meaningless data. If transmitter parameters are unknown, mutual information will be null which means a secrecy level of 100%. Simulation results show the effectiveness of the proposed approach. © 2015 IEEE. Source


Neeli-Venkata R.,Tampere University of Technology | Martikainen A.,Tampere University of Technology | Gupta A.,Tampere University of Technology | Goncalves N.,Tampere University of Technology | And 2 more authors.
Journal of Bacteriology | Year: 2016

Escherichia coli segregates protein aggregates to the poles by nucleoid exclusion. Combined with cell divisions, this generates heterogeneous aggregate distributions in subsequent cell generations. We studied the robustness of this process with differing medium richness and antibiotics stress, which affect nucleoid size, using multimodal, time-lapse microscopy of live cells expressing both a fluorescently tagged chaperone (IbpA), which identifies in vivo the location of aggregates, and HupA-mCherry, a fluorescent variant of a nucleoid-associated protein. We find that the relative sizes of the nucleoid's major and minor axes change widely, in a positively correlated fashion, with medium richness and antibiotic stress. The aggregate's distribution along the major cell axis also changes between conditions and in agreement with the nucleoid exclusion phenomenon. Consequently, the fraction of aggregates at the midcell region prior to cell division differs between conditions, which will affect the degree of asymmetries in the partitioning of aggregates between cells of future generations. Finally, from the location of the peak of anisotropy in the aggregate displacement distribution, the nucleoid relative size, and the spatiotemporal aggregate distribution, we find that the exclusion of detectable aggregates from midcell is most pronounced in cells with mid-sized nucleoids, which are most common under optimal conditions. We conclude that the aggregate management mechanisms of E. coli are significantly robust but are not immune to stresses due to the tangible effect that these have on nucleoid size. © 2016, American Society for Microbiology. All Rights Reserved. Source


Marques M.,Institute Desenvolvimento Of Novas Tecnologias | Neves-Silva R.,New University of Lisbon
Journal of Cleaner Production | Year: 2015

LifeSaver project congregates the development of contextualized decision support approach for energy savings and emissions trading. This approach aims at supporting industrial users in selecting the best alternative to ensure minimization of energy consumption during the production process as well as support to emissions trading market. LifeSaver provides decision support for: (i) immediate reaction and (ii) process reconfiguration and Emission Trading System. This categorization serves as base for defining the methods to be applied. The support for immediate reaction uses Case-based Reasoning together with probabilistic analysis. Process reconfiguration and ETS is implemented through the use of multi-criteria decision analysis based on MACBETH method, which has been adapted for LifeSaver specific characteristics. The paper proposes categorization of approaches, main criteria involved in the process and associated algorithms. Moreover the approaches proposed were successfully tested in industrial environment and the results obtained are here presented. © 2014 Elsevier Ltd. All rights reserved. Source

Discover hidden collaborations