- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Mobile Agent-Based Network Management
- Context-Aware Activity Recognition Systems
- Energy Efficient Wireless Sensor Networks
- Software-Defined Networks and 5G
- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Service-Oriented Architecture and Web Services
- Mobile Ad Hoc Networks
- Human Mobility and Location-Based Analysis
- Software System Performance and Reliability
- Advanced Software Engineering Methodologies
- Cloud Computing and Resource Management
- IoT-based Smart Home Systems
- IoT Networks and Protocols
- Internet Traffic Analysis and Secure E-voting
- IoT and GPS-based Vehicle Safety Systems
- Traffic control and management
- Network Traffic and Congestion Control
- Network Security and Intrusion Detection
- Public Health in Brazil
- Health Education and Validation
- Electricity Theft Detection Techniques
Universidade Federal da Paraíba
2015-2024
Universidade Federal do Pará
2022
University of Aveiro
2022
Redes Energéticas Nacionais (Portugal)
2019-2021
Instituto Federal de Educação, Ciência e Tecnologia do Pará
2020
University of Beira Interior
2015
University of Coimbra
1997-2011
Universidade Federal de Uberlândia
2011
Universidade Estadual de Campinas (UNICAMP)
2003-2005
Sociedade Portuguesa de Cardiologia
1997
Purpose: The reliability and construct validity of three age-adapted-intensity Yo-Yo tests were evaluated in untrained ( n = 67) vs. soccer-trained 65) 9- to 16-year-old schoolgirls. Methods: Tests performed 7 days apart for (9- 11-year-old: intermittent recovery level 1 children’s test; 12- 13-yearold: endurance 1; 14- 16-year-old: 2). Results: distance covered was 40% (776 ± 324 556 156 m), 85% (1252 484 675 252 m) 138% (674 336 283 66 greater p ≤ .010) the than girls aged 9–11, 12–13...
Drug-induced liver injury (DILI) is an unpredictable and feared side effect of antituberculosis treatment (AT). The present study aimed to identify clinical genetic variables associated with susceptibility AT-associated hepatotoxicity in patients pulmonary tuberculosis treated a standard protocol. Of 233 enrolled, 90% prospectively, 103 developed injury: 37 mild 66 severe phenotype (DILI). All hepatitis had RUCAM score ≥4 all DILI ≥ 6. Eight variants six candidate genes were assessed. A...
Intrusion Detection Systems (IDSs) are signature-based software tools that provide mechanisms for detection and analysis of network intrusions. Using an experimental scenario real traffic collected at a higher education institution in Brazil, we evaluate the performance Snort Suricata IDSs current Distributed Denial-of-Services attack (Slowloris). Our study has found IDS is not suitable number alerts to catch attention manager about Slowloris attack, while does. Evaluation CPU consumption...
In Wireless Local Area Networks (WLAN) with more than one access point (AP), the handoff process plays a crucial role to guarantee user service continuity. Usually initiated by client’s equipment, it occurs smoothly on order of seconds. However, despite being functional and well‐established, this can be inadequate in scenarios where users are executing multimedia applications, such as real‐time video streaming or VoIP. For these those few seconds may cause loss packets, resulting essential...
Critical urban events need to be efficiently handled, for instance, through rapid notification. VANETs are a promising choice in supporting notification of information on arbitrary critical events. Although the dynamicity compromises dissemination process, connections among vehicles based users' social interests allow optimizing message exchange and data dissemination. This paper introduces SOCIABLE, robust system that operates SIoV network. It is vehicles' community with common and/or...
Virtual private networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy security for fraction of the cost networks. However, establishing VPNs across different domains (inter-domain VPNs) is still cumbersome task, requiring human- based negotiation between involved carriers, manual configuration network equipment inefficient exploitation procedures during whole VPN life cycle. For these reasons, inter-domain usually...
QoS adaptation is an important process in inter-domain service management, since it can guarantee the correct provisioning when unexpected events occur. However, environments, human interference and manual-based operations hamper deployment of expeditious mechanisms to adapt services. This paper presents approach based on SOA principles perform these environments. allows providers determine new parameters, renegotiate parameters with other along path, update their contracts enforce changes...
Managing a wireless sensor network is not trivial task. Due to its limitations, such as sensors equipped with low power batteries, it essential extend the lifetime of network. This task becomes harder when dealing heterogeneous networks, in which have different physical characteristics, battery capacity and radio transmission range. paper proposes model dynamically select allocation approach order choose set process an application request. selection takes into account characteristics aspects sensors.
Many IoT scenarios demand continuous capture of information from multifunctional sensors and smart units, as well sending those data to cloud centers. However, allocating tasks these is not straightforward due the urgency priority that each type collection requires depending on needs urban environment. This paper presents POSITRON scheme for managing sensing allocation in a network previously defined policies. The policies take into account characteristics applications running different...
The number of urban vehicles has increased in the past years causing innumerous problems such as traffic jams, accidents and pollution. One main solutions for this problem is to improve quality public transportation by making it more reliable, secure efficient. In paper, proposed a system monitoring based on ZigBee technology, called MUV-Bee. Such uses wireless communication integrate server buses bus stops. Its several services provided society allow better which make them attractive.
Inter-domain QoS-aware service provisioning is still a complex task due to the Internet heterogeneity. It necessary overcome several obstacles in order achieve scenario where providers fully interact satisfy all customer requirements. Some of these are class specification and composition. This paper presents an integrated approach for composition that supports services inter-domain environments. makes use QoS performance parameters, service-specific parameters business compose fulfill...
O gerenciamento manual de ativos rede está suscetível a erros configuração, falta padronização, grande quantidade trabalho repetitivo e pouca ou nenhuma rastreabilidade alterações ao longo do tempo. A abordagem Infrastructure as Code (IaC) permite automatizar o processo configuração recursos como sistemas operacionais, serviços rede, contêineres aplicações, tratando-os software possibilitando padronização reversão da configuração. Este artigo propõe uma arquitetura integrada partir...
Eventos urbanos emergenciais ocorrem de forma aleatória e precisam ser tratados por entidades competentes para manter o bom funcionamento das cidades. Os principais desafios um tratamento eficiente recaem justamente na aleatoriedade no tempo ou espaço, rapidez acurácia da comunicação ocorrência do evento à uma entidade responsável, sendo este último desafio agravado pelo fato desta depender intervenção humana. A onipresença veículos em ambientes urbanos, sua capacidade monitoramento,...
The manual management of network assets is susceptible to configuration errors, lack standardization, a large amount repetitive work, and little or no traceability changes over time. Infrastructure as Code (IaC) approach makes it possible automate the process configuring resources such operating systems, services, containers, applications, by treating them software allowing standardization rollback. This paper proposes an integrated architecture based on different tools that use IaC assets,...
Muitos cenários de IoT demandam uma captura continua informações sensores multifuncionais e unidades inteligentes, além do envio desses dados para centros nuvem. Entretanto, a gestão da alocação das tarefas esses não é simples em razão urgência prioridade que cada tipo coleta exige dependendo necessidade ambiente urbano. Este artigo apresenta o esquema POSITRON gerenciamento sensoriamento rede multifuncional partir políticas previamente definidas. Tais consideram as características...