Skip to main content
João Bosco M. Sobral

    João Bosco M. Sobral

    There is a growing demand for data regarding the environmental and economic performance of additive manufacturing to establish the role of this technology in the future circular industrial economy. This paper provides a comparative... more
    There is a growing demand for data regarding the environmental and economic performance of additive manufacturing to establish the role of this technology in the future circular industrial economy. This paper provides a comparative analysis of direct energy deposition technology with conventional manufacturing, specifically iron casting, in the context of the repairing capabilities of the direct energy deposition system in a damaged glass bottle mold. Making use of already established methodologies for environmental and economic assessment, a life cycle assessment and a life cycle costing study was conducted on each scenario to provide a holistic perspective on the advantages and limitations of each system. With the gathered life cycle inventory, the main environmental impacts and life cycle costs were determined. The hybrid repairing scenario results show a reduction of the environmental impacts and life cycle costs by avoiding resource consumption in the production of a new mold, ...
    This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine... more
    This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. To achieve this goal, we propose the Intrusion Response Autonomic System (IRAS), which is an autonomic intrusion response system, using Big Data techniques for data analysis.
    Google, Inc. (search), Subscribe (Full Service), Register (Limited Service, Free), Login. Search: The ACM Digital Library The Guide. ...
    Background Multiple lines of evidence suggest that genetic factors contribute to stroke recovery. The matrix metalloproteinases -2 (MMP-2) and -9 (MMP-9) are modulators of extracellular matrix components, with important regulatory... more
    Background Multiple lines of evidence suggest that genetic factors contribute to stroke recovery. The matrix metalloproteinases -2 (MMP-2) and -9 (MMP-9) are modulators of extracellular matrix components, with important regulatory functions in the Central Nervous System (CNS). Shortly after stroke, MMP-2 and MMP-9 have mainly damaging effects for brain tissue. However, MMPs also have a beneficial activity in angiogenesis and neurovascular remodelling during the delayed neuroinflammatory response phase, thus possibly contributing to stroke functional recovery. Methods In the present study, the role of MMP-2 and MMP-9 genetic variants in stroke recovery was investigated in 546 stroke patients. Functional outcome was assessed three months after a stroke episode using the modified Rankin Scale (mRS), and patients were classified in two groups: good recovery (mRS ≤ 1) or poor recovery (mRS>1). Haplotype tagging single nucleotide polymorphisms (SNPs) in the MMP-2 (N = 21) and MMP-9 (N ...
    Livro de apoio ao ensino de graduacao em disciplinas de matematica discreta e logica, em cursos de ciencia da computacao.
    Livro de apoio ao ensino de graduação em disciplinas de matemática discreta e lógica, em cursos de ciência da computação.(0) Introdução (1) As Bases da Ciência da Computa cão,(2) As Origens: A Aritmética, (3) Os Números, (4) Os Números... more
    Livro de apoio ao ensino de graduação em disciplinas de matemática discreta e lógica, em cursos de ciência da computação.(0) Introdução (1) As Bases da Ciência da Computa cão,(2) As Origens: A Aritmética, (3) Os Números, (4) Os Números Primos, (5) Congruência e Aritm ética Modular, (6) Álgebra na Europa (7) A Lógica: de Leibniz a Boole, (8) Século XIX: Frege e a Lógica dos Predicados, (9) A Teoria dos Conjuntos, (10) Rela ções e Funcões, (11) Grupos e Corpos (12) Conjuntos e Enumera cão, (13) A Aritm ética nos Séculos XIX e XX, (14) Hilbert - Formalismo e os Sistemas Axiom áticos, (15) Gödel e os Limites dos Sistemas Formais, (16) Dos Fundamentos da Matemática aos Sistemas Formais, e (17) Os Sistemas Formais da Computa cão.recursos próprios; recursos do Departamento de Informática e Estatística da UFS
    The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class... more
    The Internet of Things (IoT) systems have limited resources, making it difficult to implement some security mechanisms. It is important to detect attacks against these environments and identify their type. However, existing multi-class detection approaches present difficulties related to false positives and detection of less common attacks. Thus, this work proposes an approach with a two-stage analysis architecture based on One-Vs-All (OVA) and Artificial Neural Networks (ANN) to detect and identify intrusions in fog and IoT computing environments. The results of experiments with the Bot-IoT dataset demonstrate that the approach achieved promising results and reduced the number of false positives compared to state-of-the-art approaches and machine learning techniques.
    We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them... more
    We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by technology fragmentation and complex operations making them highly susceptible to attacks like hijacking, man-in-the-middle, denial-of-service, phishing, and others. The autonomic intrusion response system introduces models of operational analysis and reaction based on the combination of autonomic computing and big data. We implemented a proof-of-concept and executed experiments that demonstrate significant improvement in effectiveness and scalability of the method in complex environments.
    In recent years, the sales of products throughout the Internet have increased significantly. However, experiences with client/server architectures applied to developing e-commerce systems have shown some limitations related to... more
    In recent years, the sales of products throughout the Internet have increased significantly. However, experiences with client/server architectures applied to developing e-commerce systems have shown some limitations related to system's needs, such as product choosing process, pricing process, and decision making while negotiating the price. These limitations might have profound impact on regular customers interested in purchasing the products. This
    ... Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which have been used in the ... This pa-per presents a novel intrusion detection model based upon artificial immune and mobile agent paradigms... more
    ... Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which have been used in the ... This pa-per presents a novel intrusion detection model based upon artificial immune and mobile agent paradigms for network intrusion detection. ...
    Searching... Advanced Search. Google Search Engine. ...
    ... model demand used in our simulations is the HTTP protocol, which generates 100 Kb/s. The duration of the simulation is 600s and ... we wish to evaluate the per-formance variation of the original OLSR and AODV in comparison with OLSR... more
    ... model demand used in our simulations is the HTTP protocol, which generates 100 Kb/s. The duration of the simulation is 600s and ... we wish to evaluate the per-formance variation of the original OLSR and AODV in comparison with OLSR and AODV using self-configuration ...
    ... Networks Igor Vinicius Mussoi de Lima and Joelson Alencar Degaspari and Jo˜ao Bosco Mangueira Sobral Federal Univesity of Santa Catarina Computer Science Program - Florianópolis-SC, Brazil Email: mussoi,joelson,bosco@inf.ufsc.br ...... more
    ... Networks Igor Vinicius Mussoi de Lima and Joelson Alencar Degaspari and Jo˜ao Bosco Mangueira Sobral Federal Univesity of Santa Catarina Computer Science Program - Florianópolis-SC, Brazil Email: mussoi,joelson,bosco@inf.ufsc.br ... [5] B. Caswell, J. Beale, JC Foster, ...
    Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly... more
    Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network's scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the b...
    WebLabs are novel eLearning applications with a promising future. Once a WebLab reaches the state of stable prototype, there are still many issues that have to be taken care of before the system can be considered a first quality web based... more
    WebLabs are novel eLearning applications with a promising future. Once a WebLab reaches the state of stable prototype, there are still many issues that have to be taken care of before the system can be considered a first quality web based application. In the following pages some of these issues are addressed, and pointers are given so as to take the first steps in dealing with WebLab security, accessibility, collaborative development and multilinguality.