- Real-Time Systems Scheduling
- Embedded Systems Design Techniques
- Distributed systems and fault tolerance
- Parallel Computing and Optimization Techniques
- Petri Nets in System Modeling
- Mobile Agent-Based Network Management
- Distributed and Parallel Computing Systems
- Advanced Software Engineering Methodologies
- Interconnection Networks and Systems
- Optimization and Search Problems
- Software System Performance and Reliability
- Formal Methods in Verification
- Network Time Synchronization Technologies
- Peer-to-Peer Network Technologies
- Oral microbiology and periodontitis research
- Fault Detection and Control Systems
- Dental Health and Care Utilization
- Smart Grid Security and Resilience
- Network Traffic and Congestion Control
- Systems Engineering Methodologies and Applications
- IoT-based Smart Home Systems
- Energy Harvesting in Wireless Networks
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Software Reliability and Analysis Research
Universidade para o Desenvolvimento do Alto Vale do Itajaí
2024
Universidade Estadual de Feira de Santana
2024
Universidade Estadual de Londrina
2024
Helmholtz Centre for Infection Research
2021-2024
Universidade Federal de Santa Catarina
2013-2022
Pontifícia Universidade Católica do Rio Grande do Sul
2020
Uningá - Centro Universitário Ingá
2020
Universidade Federal do Rio Grande do Sul
1987-2016
Faculdade da Serra Gaúcha
2016
Universidade Federal de Santa Maria
2016
The aim of this study was to estimate the independent effects biofilm accumulation and eruption stage on occurrence active caries lesions occlusal surfaces permanent molars. sample consisted 298 schoolchildren (6-15 years) who were examined by a calibrated examiner at dental unit, using artificial light, mirror WHO probe. visible each molar recorded. After professional prophylaxis air drying, classified as sound, caries-inactive or caries-active. To evaluate association with lesions,...
This study aimed to evaluate the effect of a digital learning tool on undergraduate dental students' performance in detecting caries using ICDAS.An experimental (DLT) was created photographs sound and carious teeth. Thirty-nine students were divided into three groups (n = 13) each assessed 12 randomly allocated patients before after strategies: G1, ICDAS e-learning program; G2, program plus DLT; G3, no strategy. Students 32) reassessed 2 weeks training.Comparing strategies, any difference...
The development process of complex systems needs to take in account differents domains and aspects. SysML (Systems Modeling Language) is a new modeling language that allows system description with various integrated diagrams (as structure, behavior requirements diagrams), but lacks formality for the requirement verification. aim this paper propose an approach verify using as which describes structure requirements. Petri nets temporal logic LTL are used respectively formalize benefit such...
Summary In the theory of real‐time scheduling, tasks are described by mathematical variables, which used in analytical models order to prove schedulability system. On Linux, computer programs, and Linux developers try lower latencies caused kernel, trying achieve faster response for highest‐priority task. Although both seek temporal correctness, they use different abstractions, end up separating these efforts two worlds, making it hard practitioners understand apply formally proved kernel...
The technique known as Measurement-Based Probabilistic Timing Analysis (MBPTA) promises producing Worst-Case Execution Time (WCET) bounds for real-time systems' tasks based on the analysis of execution time measurements through Extreme Value Theory (EVT), a statistical framework designed to estimate probability extreme events. For that MBPTA requires analysed tasks' maximum observed times adhere an value distribution, such Gumbel or Generalized (GEV), and allows determining values expected...
The human gut microbiota is influenced by various factors, including health status and environmental conditions, yet considerable inter-individual differences remain unexplained. Previous studies identified that the of men who have sex with (MSM) distinct from non-MSM. Here, we reveal through species-level analysis using shotgun metagenomics many MSM Western origin resembles microbial communities non-Westernized populations. Specifically, microbiomes are frequently dominated members...
In recent years, the FlexRay communication protocol been promoted as a de facto standard for in-vehicular communication. protocol, timeline is organized sequence of four segments, whereas static segment defines set slots specifically designed transmission synchronous messages. this paper, we investigate following problem: "how to allocate minimum number each node, while guaranteeing that all messages will be transmitted before their deadlines." Unlike previous studies use linear programming...
The Internet of Things is a new paradigm where smart embedded devices and systems are connected to the Internet. In this context, Wireless Sensor Networks (WSN) becoming an important alternative for sensing actuating critical applications like industrial automation, remote patient monitoring domotics. IEEE 802.15.4 protocol has been adopted as standard WSN 6LoWPAN proposed overcome challenges integrating protocols. paper, mechanisms header compression fragmentation IPv6 datagrams in were...
This study aimed to compare the facial profile attractiveness of Class III borderline patients after surgical or compensatory orthodontic treatment.The sample consisted 60 malocclusion patients, divided into two groups: Group 1 (Surgical): 30 (16 male; 14 female) treated with fixed appliances and bimaxillary orthognathic surgery. Mean initial age was 20.05 years (s.d.=2.40) mean treatment time 2.23 (s.d.=0.82). 2 (Compensatory): (13 17 compensatorily elastics. 18.53 (s.d.=4.35) 2.08...
Linux has become a viable operating system for many real-time workloads. However, the black-box approach adopted by cyclictest, tool used to evaluate main metric of kernel, scheduling latency, along with absence theoretically-sound description in-kernel behavior, sheds some doubts about meriting adjective. Aiming at clarifying PREEMPT_RT this paper leverages Thread Synchronization Model derive set properties and rules defining kernel behavior from perspective. These are then leveraged sound...
The idea of using Virtualization and Cloud as the underlying infrastructure for future automation systems in context Internet Things has been presented literature. This paper presents assessment end-to-end performance a distributed virtualized architecture from DDS communication middleware layer, running test benchmark applications OpenDDS implementation. experimental environment used considers two ordinary physical hosts connected by single network. virtualization layer is realized with KVM...
Till nowadays, the Controller Area Network (CAN) has been a de facto standard for communication in automotive applications. To meet requirements of new high-end vehicular systems, protocols such as FlexRay Communication System and CAN with Flexible Data-rate (CAN-FD) developed. In near future, it is expected coexistence those same vehicle, electronic control units (ECUs) connected to different network buses exchanging information through gateways. this paper we investigate following problem:...
The mobile agent technology is an important research area in the scope of code mobility. As part mission objective, it may exist necessity meeting end-to-end deadline, although with some flexibility about itinerary should follow. objective this paper to define execution model for agents that include timing constraints. We also show simple heuristics are able guide these definition, considering existence deadline mission.
As computer architectures evolve, guaranteeing that Real-Time Systems’ (RTSs’) timing requirements are met through Worst Case Execution Time (WCET) upper bounds becomes increasingly difficult. Techniques such as Measurement-Based Probabilistic Timing Analysis (MBPTA) have emerged estimate WCET exceeded only with arbitrarily low probabilities (i.e., pWCETs) Extreme Value Theory (EVT). The Peaks Over Threshold (POT) approach for applying EVT involves adjusting a tail-shaped distribution, e.g.,...
In general purpose operating systems, such as the mainline Linux, priority inversions occur frequently and are not considered harmful. They avoided or limited in real-time systems. current version of kernel PREEMPT-RT protocol used for inversion control is Priority Inheritance. The objective this paper to propose implementation an alternative protocol, Immediate Ceiling, for use drivers dedicated applications. This explains how was implemented compare with Inheritance implementation,...
The idea of using Virtualization and Cloud as the underlying infrastructure electrical automation systems has been presented in literature but not properly evaluated. In this paper, a Physical to Virtual solution, or simply P2V approach, for specific application case substation automatic voltage control (SAVC) is proposed simulated environment. Along with some fundamental IEC 61850 concepts, paper presents physical versus virtual mapping system requirements. From logical design that...
CORBA is an emerging middleware infrastructure with open standardization that receiving a good acceptance since it allows easier programming of distributed objects. being extended through the specification interfaces and necessary abstractions to support applications real time constraints. These new will enable variety models for applications. The paper presents adaptive model using concepts. combines polymorphic invocation technique (m,k)-firm guarantee.
Worst-case execution time (WCET) is a parameter necessary to guarantee timing constraints on real-time systems. The higher the worst-case of tasks, will be resource demand for associated system. goal this paper propose different way perform loop unrolling data-dependent loops using code predication targeting WCET reduction, because existing techniques only consider with fixed counts. We also combine our technique approaches. Results showed that combination can produce aggressive reductions...