Loading [MathJax]/extensions/MathZoom.js
Célio Albuquerque - IEEE Xplore Author Profile

Showing 1-25 of 72 results

Filter Results

Show

Results

The rapid growth of grid-integrated solar plants and Distributed Energy Resources (DER) has introduced advanced electrical devices into both domestic and industrial environments. In this expanding landscape, standardization is essential to ensure compatibility, security, and seamless communication among devices from various manufacturers. This paper explores the IEEE 2030.5-2018 standard, which is...Show More
The Greedy Randomized Adaptive Search Procedure for Feature Selection (GRASP-FS) is a recently-proposed metaheuristic that optimizes the feature selection process for Intrusion Detection Systems (IDS) by combining exploration and refinement techniques for more assertive intrusion detection. However, GRASP-FS may be time and resource-consuming for large datasets. In this work, we propose GRASPQ-FS,...Show More
Video applications in the Internet of Things benefit from multipath routing strategies to meet Quality of Service requirements. Although several multipath selection mechanisms have been proposed, changes in topology and/or in video services requirements can impact video quality. This work presents a wireless network architecture that enables dynamic routing, adapting these changes to new path solu...Show More
Heart rate monitoring is crucial for detecting possible changes in human health. Therefore, in recent years, the development of applications and devices that monitor vital signs has evolved significantly. This work proposes a non-contact approach to heart rate monitoring through the processing of channel state information from a commodity Wi-Fi network. Various settings for signal processing param...Show More
Connected and digital electricity substations based on IEC–61850 standards enable novel applications. On the other hand, such connectivity also creates an extended attack surface. Therefore, Intrusion Detection Systems (IDSs) have become an essential component of safeguarding substations from malicious activities. However, in contrast to traditional information technology systems, there is a serio...Show More
The remix technique has been widely used in musical practice, mainly due to the figure of Disc Jockeys (DJs), which combines several pre-existing sounds to produce completely new content. However, this creation method also appears in other forms of artistic expressions, such as architecture, photography, fashion design, video games, etc. Recent technological advances favor the emergence of gadgets...Show More
Over time, identification devices and applications have evolved. However, they still require people to perform certain actions to obtain their identification. Recently, Channel State Information (CSI) has emerged as a promising technology that resonates strongly in the evolution of identification systems. CSI allows obtaining information on the state of the transmission channel in Wi-Fi networks a...Show More
For Internet of Things devices, one of the main power demands comes from the radio interfaces. Hence, duty cycling, i.e., activating and deactivating the radio, becomes essential to energy savings. In asynchronous scenarios, scheduled-based duty cycle methods stand out for their low deployment cost. Recently, the literature reports many studies on asymmetric scheduled-based methods — i.e., differe...Show More
Recent studies corroborate Wi-Fi Channel State Information (CSI) usability to monitor patients remotely and obtain health information non-invasively and with low-cost. In addition to monitoring vital signs, this technology can also be applied to presence detection, subject recognition, position and movement identification, among other uses. Despite its wide range of potential applications, there i...Show More
Private blockchain platforms tend to apply deterministic consensus mechanisms as a more efficient alternative to the proof-based consensus. Deterministic mechanisms tolerate two types of failures, Byzantine, and Crash-Fault. Byzantine-Fault tolerant consensus assumes restrictive assumptions of time and number of failures to guarantee the validity, while the termination depends on node message broa...Show More
In this paper, we propose a cache prefetching policy for the Multi-access Edge Computing architecture (MEC) that considers the temporal and social behaviors of mobile users. The key point of our policy is to prefetch new contents based on the popularity of their categories and not on the popularity of each content individually. Our goal is to increase the Quality of Experience (QoE) of mobile user...Show More
With the development of smart devices, human detection and localization became important tasks for several applications including security, healthcare monitoring, entertainment, and so on. Existing signal-based detection systems, mostly focus on detecting human activities and classifying them by Machine Learning (ML) methods, like Support Vector Machine (SVM) and Random Forest (RF). This paper foc...Show More
In IoT video applications, such as public transportation and traffic monitoring, video is often transmitted over a multi-hop wireless network and has stringent Quality of Service requirements. While multipath routing has been proposed as an effective strategy for supporting this demand, it should select paths that meet the requirements of the driving video application in a timely manner. In this p...Show More
Digital electrical substations are fundamental in providing a reliable basis for Smart Grids. However, the deployment of the IEC-61850 standard for communication between Intelligent Electronic Devices (IEDs) brings new security challenges. Intrusion Detection Systems (IDSs) play a vital role to ensure the proper function of digital substations services. However, the current literature lacks effici...Show More
Evaluating wireless links is a common task for many control mechanisms. However, the inherent variability of those estimates negatively impacts network performance. To reduce this variability, the Hypothesis Test Estimator (HTE) was recently developed as an alternative to the commonly employed moving averages. Performance analyses carried out in recent works found that HTE returns more stable esti...Show More
The use of the Internet of Things has proven to be an alternative for health monitoring, providing less discomfort to patients and good cost-benefit. To fully exploit the benefits of wireless technologies in e-health, the IEEE 802.15.6 standard for Wireless Body Area Networks (WBAN) has been created. However, technical and social challenges must be addressed to enable their adoption. Some factors,...Show More
Cyber-Physical Systems (CPS) are the basis for the world’s critical infrastructure and, thus, have the potential to significantly impact human lives in the near future. In recent years, there has been an increasing demand for connectivity in CPS, which has brought to attention the issue of cybersecurity. Aside from traditional information systems threats, CPS face new challenges due to the heterog...Show More
With the development of wireless technologies and the proliferation of sensors, Wireless Sensor Networks (WSNs) have been widely used in many applications. However, their energy constraints make energy reduction one of the main project concerns. Among the several solutions in the literature, schedule-based asynchronous duty cycle methods are the simplest because they do not require synchronization...Show More
Sensing and monitoring electrical signals and power device parameters within the smart grid network infrastructure plays a fundamental role in assessing the smart devices' proper functioning. Nevertheless, a key challenge for academic teaching and researching purposes is the elevated cost of real electronic devices, such as current and potential transformers, or even intelligent electronic devices...Show More
Cyber-Physical Systems (CPS) will form the basis for the world's critical infrastructure and, thus, have the potential to significantly impact human lives in the near future. In recent years, there has been an increasing demand for connectivity in CPS, which has brought to attention the issue of cyber security. Aside from traditional information systems threats, CPS faces new challenges due to the...Show More
Medical images are important elements for the diagnosis of diseases. Computer Aided Diagnostic has evolved in recent years along with the processing capacity of computers as well as the emergence of new computational techniques. Segmentation is a valuable approach for identifying a specific area in human body images, such as the lungs and heart. This work proposes an algorithm to segment anatomica...Show More
Advances in electronics have enabled the development of intelligent miniaturized biomedical sensors that can be used to monitor the human body. The use of wireless communication proved to be an alternative, which provides less discomfort to patients and good cost-benefit. In order to fully exploit the benefits of wireless technologies in e-health, a new type of wireless networks has emerged: Wirel...Show More
Reducing energy consumption is of paramount importance in wireless networks, particularly now with the increasing popularity of the Internet of Things. One of the most effective tools for that is duty cycling the radio. In particular, asynchronous methods have been repeatedly studied in the literature. In this letter, we consider the asymmetrical case of asynchronous duty cycling, i.e., when nodes...Show More
This paper presents the Link-Quality Aware and Thermal Aware On-Demand Routing (LATOR) protocol, a proposal for routing in Wireless Body Area Networks (WBAN). LATOR improves Packet Delivery Rate (PDR) in intra-WBAN communication with node overheating prevention. This protocol avoids overheating considering only each node's temperature without exchanging temperature information between neighboring ...Show More