There is a growing demand for data regarding the environmental and economic performance of additive manufacturing to establish the role of this technology in the future circular industrial economy. This paper provides a comparative... more
There is a growing demand for data regarding the environmental and economic performance of additive manufacturing to establish the role of this technology in the future circular industrial economy. This paper provides a comparative analysis of direct energy deposition technology with conventional manufacturing, specifically iron casting, in the context of the repairing capabilities of the direct energy deposition system in a damaged glass bottle mold. Making use of already established methodologies for environmental and economic assessment, a life cycle assessment and a life cycle costing study was conducted on each scenario to provide a holistic perspective on the advantages and limitations of each system. With the gathered life cycle inventory, the main environmental impacts and life cycle costs were determined. The hybrid repairing scenario results show a reduction of the environmental impacts and life cycle costs by avoiding resource consumption in the production of a new mold, ...
Research Interests:
Research Interests:
This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine... more
This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. To achieve this goal, we propose the Intrusion Response Autonomic System (IRAS), which is an autonomic intrusion response system, using Big Data techniques for data analysis.
Research Interests:
Research Interests:
Research Interests:
Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...
Research Interests:
Research Interests: Cognitive Science, Computer Science, Distributed Computing, Parallel Computing, Data Analysis, and 15 moreSystem Management, Cellular Automata, Molecular Computing, Neural Network, Intrusion Detection, Mobile telecommunication, Artificial Immune System, Fraud Detection, Mobile phone, Intrusion Detection System, Natural Phenomena, Log Files, Computational Method, Software Package, and Human Immune System
Background Multiple lines of evidence suggest that genetic factors contribute to stroke recovery. The matrix metalloproteinases -2 (MMP-2) and -9 (MMP-9) are modulators of extracellular matrix components, with important regulatory... more
Background Multiple lines of evidence suggest that genetic factors contribute to stroke recovery. The matrix metalloproteinases -2 (MMP-2) and -9 (MMP-9) are modulators of extracellular matrix components, with important regulatory functions in the Central Nervous System (CNS). Shortly after stroke, MMP-2 and MMP-9 have mainly damaging effects for brain tissue. However, MMPs also have a beneficial activity in angiogenesis and neurovascular remodelling during the delayed neuroinflammatory response phase, thus possibly contributing to stroke functional recovery. Methods In the present study, the role of MMP-2 and MMP-9 genetic variants in stroke recovery was investigated in 546 stroke patients. Functional outcome was assessed three months after a stroke episode using the modified Rankin Scale (mRS), and patients were classified in two groups: good recovery (mRS ≤ 1) or poor recovery (mRS>1). Haplotype tagging single nucleotide polymorphisms (SNPs) in the MMP-2 (N = 21) and MMP-9 (N ...
Research Interests:
Livro de apoio ao ensino de graduacao em disciplinas de matematica discreta e logica, em cursos de ciencia da computacao.
Research Interests:
Research Interests:
Livro de apoio ao ensino de graduação em disciplinas de matemática discreta e lógica, em cursos de ciência da computação.(0) Introdução (1) As Bases da Ciência da Computa cão,(2) As Origens: A Aritmética, (3) Os Números, (4) Os Números... more
Livro de apoio ao ensino de graduação em disciplinas de matemática discreta e lógica, em cursos de ciência da computação.(0) Introdução (1) As Bases da Ciência da Computa cão,(2) As Origens: A Aritmética, (3) Os Números, (4) Os Números Primos, (5) Congruência e Aritm ética Modular, (6) Álgebra na Europa (7) A Lógica: de Leibniz a Boole, (8) Século XIX: Frege e a Lógica dos Predicados, (9) A Teoria dos Conjuntos, (10) Rela ções e Funcões, (11) Grupos e Corpos (12) Conjuntos e Enumera cão, (13) A Aritm ética nos Séculos XIX e XX, (14) Hilbert - Formalismo e os Sistemas Axiom áticos, (15) Gödel e os Limites dos Sistemas Formais, (16) Dos Fundamentos da Matemática aos Sistemas Formais, e (17) Os Sistemas Formais da Computa cão.recursos próprios; recursos do Departamento de Informática e Estatística da UFS
Research Interests:
The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class... more
The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class detection approaches present difficulties related to false positives and detection of less common attacks. Thus, this work proposes an approach with a two-stage analysis architecture based on One-Vs-All (OVA) and Artificial Neural Networks (ANN) to detect and identify intrusions in fog and IoT computing environments. The results of experiments with the Bot-IoT dataset demonstrate that the approach achieved promising results and reduced the number of false positives compared to state-of-the-art approaches and machine learning techniques.
Research Interests:
Research Interests:
Research Interests:
We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them... more
We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them highly susceptible to attacks like hijacking, man-in-the-middle, denial-of-service, phishing, and others. The autonomic intrusion response system introduces models of operational analysis and reaction based on the combination of autonomic computing and big data. We implemented a proof-of-concept and executed experiments that demonstrate significant improvement in effectiveness and scalability of the method in complex environments.
Research Interests:
In recent years, the sales of products throughout the Internet have increased significantly. However, experiences with client/server architectures applied to developing e-commerce systems have shown some limitations related to... more
In recent years, the sales of products throughout the Internet have increased significantly. However, experiences with client/server architectures applied to developing e-commerce systems have shown some limitations related to system's needs, such as product choosing process, pricing process, and decision making while negotiating the price. These limitations might have profound impact on regular customers interested in purchasing the products. This
Research Interests:
Research Interests:
... Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which have been used in the ... This pa-per presents a novel intrusion detection model based upon artificial immune and mobile agent paradigms... more
... Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which have been used in the ... This pa-per presents a novel intrusion detection model based upon artificial immune and mobile agent paradigms for network intrusion detection. ...
Research Interests: Computational Modeling, Artificial Immune Systems, Computer Networks, Agent Based, Complex Networks, and 15 moreCellular Automata, Anomaly Detection, Computer Network, Intrusion Detection, Case Study, Artificial Immune System, Mobile Agents, Intrusion Detection System, Immune system, Mobile Agent, Computer Network Security, Organisms, Agent Based Model, Model coupling, and Generic model
Searching... Advanced Search. Google Search Engine. ...
Research Interests:
Research Interests:
... model demand used in our simulations is the HTTP protocol, which generates 100 Kb/s. The duration of the simulation is 600s and ... we wish to evaluate the per-formance variation of the original OLSR and AODV in comparison with OLSR... more
... model demand used in our simulations is the HTTP protocol, which generates 100 Kb/s. The duration of the simulation is 600s and ... we wish to evaluate the per-formance variation of the original OLSR and AODV in comparison with OLSR and AODV using self-configuration ...
Research Interests:
... Networks Igor Vinicius Mussoi de Lima and Joelson Alencar Degaspari and Joao Bosco Mangueira Sobral Federal Univesity of Santa Catarina Computer Science Program - Florianópolis-SC, Brazil Email: mussoi,joelson,bosco@inf.ufsc.br ...... more
... Networks Igor Vinicius Mussoi de Lima and Joelson Alencar Degaspari and Joao Bosco Mangueira Sobral Federal Univesity of Santa Catarina Computer Science Program - Florianópolis-SC, Brazil Email: mussoi,joelson,bosco@inf.ufsc.br ... [5] B. Caswell, J. Beale, JC Foster, ...
Research Interests: Computer Science, Computer Networks, Packaging, Neural Networks, Artificial Neural Networks, and 13 moreIntrusion Detection, Knowledge Based Systems, Misuse Detection, Knowledge base, Intrusion Detection System, Prototypes, Network Operations, Artificial Neural Network, Rule Based, Network Intrusion Detection System, False Negative, False Positive, and Neural nets
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly... more
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network's scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the b...
Research Interests: Analytical Chemistry, Software, Sensors, Wireless Technology, Heterogeneous Wireless Networks, and 9 moreAd hoc On-Demand Distance Vector, Routing Protocol, Software Agent, Self Organization, Wireless Mesh Network, Simulation Analysis, Internet, Electrical And Electronic Engineering, and optimized link state routing protocol (OLSR)
Research Interests: Distributed Computing, Artificial Intelligence, Computer Networks, Body, Agent Based, and 15 moreComputer Security, Distributed System, Anomaly Detection, Communication model, Computer Network, Correlation, Human Body, Computer Communications, Artificial Immune System, Anomaly, Computer Network Security, Data Processing, Computer, Electrical And Electronic Engineering, and Human Immune System
WebLabs are novel eLearning applications with a promising future. Once a WebLab reaches the state of stable prototype, there are still many issues that have to be taken care of before the system can be considered a first quality web based... more
WebLabs are novel eLearning applications with a promising future. Once a WebLab reaches the state of stable prototype, there are still many issues that have to be taken care of before the system can be considered a first quality web based application. In the following pages some of these issues are addressed, and pointers are given so as to take the first steps in dealing with WebLab security, accessibility, collaborative development and multilinguality.