- UAV Applications and Optimization
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Distributed Control Multi-Agent Systems
- Robotics and Automated Systems
- Quality and Supply Management
- Dam Engineering and Safety
- Civil and Structural Engineering Research
- Wireless Body Area Networks
- Vehicular Ad Hoc Networks (VANETs)
- Indoor and Outdoor Localization Technologies
- Academic Research in Diverse Fields
- Anatomy and Medical Technology
- Robotics and Sensor-Based Localization
- Genetic and Kidney Cyst Diseases
- Robotic Path Planning Algorithms
- Security in Wireless Sensor Networks
- Legal Issues in South Africa
- Liver Disease and Transplantation
- Sympathectomy and Hyperhidrosis Treatments
- Myofascial pain diagnosis and treatment
- Cloud Data Security Solutions
- Scoliosis diagnosis and treatment
- Modular Robots and Swarm Intelligence
- Child Therapy and Development
Universidade Federal de São Carlos
2024
Centro Hospitalar do Porto
2023
Universidade Federal de Pernambuco
2022
Universidade de São Paulo
2017-2022
Brazilian Society of Computational and Applied Mathematics
2020-2021
Hospital Universitário da Universidade de São Paulo
2017
Universidade Federal de Uberlândia
2015
The wireless communication has played a significant impact on our daily lives introducing simplicity and making life more comfortable. \ As result of faster technological advances in electronics communications, the development different types unmanned aerial vehicles (UAVs) become possible. Recently, many efforts have been made to develop efficient inter- intra-vehicle protocols new challenges, e. g. multiple-UAV Flying Ad Hoc Networks (FANETs). However, most experiments using real...
Unmanned Aerial Systems (UASs) are being employed in many different applications, and with the increased usage security concerns become more accentuated. Communication links core components of a UAS, providing secure communication channel is necessity which Authentication strategies play major role. However, resource-constrained devices cannot adopt off-the-shelf that were not developed taking into account those devices' constraints. Because that, new strategies, including authentication,...
This paper describes the challenges raised from use of Unmanned Aerial Vehicles (UAVs) on exploration inhospitable places that present limitations and risks to humans; for instance, we describe case cave exploration. UAVs have emerged as an attractive alternative performing this task in a safety reliable manner. However, regarding control management, accurate positioning navigation, wireless connectivity need be addressed order achieve effective solutions. Herein, address those possible...
Several market sectors are attracted by the potential of unmanned aerial vehicles (UAVs), such as delivery, agriculture, and cinema, among others. UAVs becoming part Internet Things (IoT) networks in development autonomous scalable solutions. However, these gradually attractive targets for cyberattacks. This study proposes an efficient platform based on Message Queuing Telemetry Transport (MQTT) protocol UAV control Denial-of-Service (DoS) detection embedded system. For efficiency test,...
Unmanned Aerial Vehicles (UAVs) have gained popularity and are current applied in many fields. They benefited from the recent technology development now increased connectivity, which allows them to achieve higher levels of mission complexity coverage. Among others, security is considered one greatest challenges for UAV usage acceptance general public, it scales when this vehicle can communicate with other vehicles and/or systems. This paper presents Cloud-SPHERE, a approach unmanned provide...
Energy efficiency is a topic with increasing relevance in the computing field. The Green Computing paradigm global concept that aims at energy efficiency, lowering greenhouse gas emissions, using less harmful materials, and encouraging reuse recycling. For battery-powered embedded systems like Unmanned Aerial Vehicles (UAVs), increases their autonomy, resulting tasks being realized power. With power consumed during each mission, battery will require fewer recharges, thereby its lifetime...
Due to their characteristics, Unmanned Aerial Vehicles (UAVs) are natural candidates be integrated the Internet of Things (IoT). However, offering UAV services through IoT and Cloud Computing is not an easy task. Resources made available clients need properly identified registered; must prepared provide autonomously both human machine clients, which can very heterogeneous regarding computational networking resources; information security data privacy taken into account. In this paper, we...
Unmanned Vehicles can benefit from contextual information to improve their operation and security. In fact, a node in any network might assume different levels of criticality depending on several factors, such as inner components' states, data relevance, provided services, infor-mation. Being aware level for an individual helps determining more consistent approaches communication security/safety implementations. this paper, the integration security UV architecture is demonstrated, order...
The Internet of Things (IoT) is believed to bring new unprecedented development our society and will impact enable new, more powerful applications in many areas. When considering Unmanned Aerial Vehicles (UAVs), there potential enhance emergency response situations, smart cities, industry others. UAVs are expected provide consume services as one the things IoT environment. However, intrinsic heterogeneity regarding devices, platforms, communication protocols makes task service provision...
From the study of contracting with Public Power through biddings in Brazilian legal system, an analysis who/which bodies can participate bidding procedure, it is possible to identify flaws procedure that favor occurrence, practice, crimes against Administration, which contribute increase corruption country.In view this, objective this work is, a bibliographical research qualitative nature, objectively transmit community necessary procedures contract public power, identifying weaknesses...