Introduction: Portugal has a long tradition of plants and herbal preparations for medicinal purposes (herbal medicines - HMs), but few studies on their use today. The professions of phytotherapy have recently been regulated, enabling more efficacy and safety. Objectives: 1) assess the use of HMs in Portugal, including attitudes, behaviors, sources of information, acquisition methods and role of HMs in health ma...
The new communication paradigm established by Social Media, along with its growing popularity in recent years contributed to attract an increasing interest by several research fields. One such research field is the field of event detection in Social Media. The purpose of this work is to implement a system to detect newsworthy events in Twitter. A similar system proposed in the literature is used as the base of ...
Access control, when used in the context of database applications, is aimed to supervise the requests made by legitimate users to access sensitive data. These requests represent actions that a user can perform on a database and they typically read or write data. While this supervision can be formalized at a higher level, e.g. using an access control model such as RBAC, in the end, the data access is done throug...
This paper detail the process of radio frequency network planning and design for PASMO pilot project, an open living lab for cooperative ITS and smart cities, starting from analyzing the network and users requirements, going through choosing the appropriate technologies and equipments, and finally testing and validating the feasibility of the proposed deployment plan. Other important outcome of this work is a d...
Vehicular communications are gaining one of the largest share of the automotive IoT market. The combination of the automotive sector with the transportation resulted in the emergence of the concept of connected vehicles. Therefore, motivating new proposals for real-time applications for managing traffic and incident alerts to improve the overall mobility and road safety. The growing demand for new and better so...
The increasing number of small, cheap devices full of sensing capabilities lead to an untapped source of information that can be explored to improve and optimize several systems. Yet, as this number grows it becomes increasingly difficult to manage and organize all this new information. The lack of a standard context representation scheme is one of the main difficulties in this research area (Antunes et al., 20...
In recent years the technological world has grown by incorporating billions of small sensing devices, collecting and sharing real-world information. As the number of such devices grows, it becomes increasingly difficult to manage all these new information sources. There is no uniform way to share, process and understand context information. It is our personal belief that IoT and M2M scenarios will only achieve ...
In recent years the Internet has grown by incorporating billions of small devices, collecting real-world information and distributing it though various systems. As the number of such devices grows, it becomes increasingly difficult to manage all these new information sources. Several context representation schemes have tried to standardize this information, however none of them have been widely adopted. Instead...
Pervasive environments involve the interaction of users with the objects that surround them and also other participants. In this way, pervasive communities can lead the user to participate beyond traditional pervasive spaces, enabling the cooperation among groups taking into account not only individual interests, but also the collective and social context. In this study, the authors explore the potential of usi...
Call Level Interfaces (CLI) provide a set of functionalities to ease the connection between client applications and relational databases. Among them, the management of data retrieved from databases is emphasized. The retrieved data is kept in local memory structures (LMS) that allow client applications to read it and modify it through protocols. They are row (tuple) oriented and, while being executed, they cann...