Papers by Joaquim Celestino Jr.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Wireless Sensor Networks (WSN) consist in a set ofsensor nodes that collect data in the environme... more Wireless Sensor Networks (WSN) consist in a set ofsensor nodes that collect data in the environment and send it to a Base Station that processes the final data. Some challenges may be found, such as minimizing energy consumption and maximize the network lifetime. Many protocols achieve energy savings through network clustering. This paper presents a new modeling graph using flow network to improve the routing protocols using the clustering technique, improving the routing of data between clusters-head, as well as by setting a time for a round in the clustering process. With this agnostic technique, our proposal may increase the network lifetime, balance the power consumption among the nodes and better distribute the data transmissions. Through simulations in network simulator Omnet++, Castalia, the proposal is validated and its efficiency is verified by comparing it to other protocols which work with clustering techniques.
Bookmarks Related papers MentionsView impact
Vehicular Ad Hoc Networks (VANETs) are networks formed by vehicles using the wireless medium as c... more Vehicular Ad Hoc Networks (VANETs) are networks formed by vehicles using the wireless medium as communication link for data transmission and reception. In this network, vehicles can transit on the roads with high speed and thus provide a high dynamism in its topology. This may cause the connectivity between vehicle lasts a short time. So, many applications in VANETs, which need to disseminate data traffic seek a fast and efficient diffusion mechanism. The forwarding broadcast mechanism is generally used to accomplish this task. However, a poorly elaborated mechanism for disseminating messages can flood the network with redundant data and increase the number of collisions due to disputes between vehicles for accessing the medium. These problems are usually known as broadcast storm problem. Thus, this paper proposes a probabilistic technique for mitigating the broadcast storm problem through a game from the Games Theory: The Volunteers Dilemma. In order to explore the equilibrium in t...
Bookmarks Related papers MentionsView impact
Abstract—The large number of accidents caused by unsuccess-ful motor vehicle overtaking manoeuvre... more Abstract—The large number of accidents caused by unsuccess-ful motor vehicle overtaking manoeuvres on roads is a significant problem with much public debate and concerns. In addition, one accident might cause another follow on accident when there is no signalling/reporting of it occurring, thus causing obstructions and further accidents in the vicinity. This can seriously affect the traffic flows, generating traffic jams and sometimes resulting in more unwarranted accidents, which can be avoided with the application of technology. The emergence of wireless ad hoc and sensor technologies and their adoption in vehicular networks can provide smart solutions to mitigate the probability of accidents and avoidance of dangerous traffic flow situations. This paper presents some important concepts for an application development to assist the driver in overtaking manoeuvres with prior knowl-edge of oncoming traffic, even when the road curvature has blind spots. In order to do that, the applic...
Bookmarks Related papers MentionsView impact
Cardiovascular diseases (CVD) are the leading cause of death in the world, representing almost 31... more Cardiovascular diseases (CVD) are the leading cause of death in the world, representing almost 31% of global deaths. Therefore, continuous research on early diagnosis methods has been made to achieve more effective treatments of CVDs. Electrocardiogram (ECG) stands as the most common technique used to monitor cardiac variations. In ECG, five key points (a.k.a. fiducial points) correspond to the wave peaks P, Q, R, S, and T, whereby anomalies in the relative positions of these fiducial points indicate a potential CVD. Therefore, a real-time decision support system capable of detecting ECG fiducial points is of paramount importance to early treatment. This paper proposes a real-time method to identify fiducial points in ECGs leveraging for this moving averages and heuristics. The performance comparison between the proposed method applied to the MIT-BIH Arrhythmia Database over other relevant methods found in the literature has been carried out. Results show that the proposed method ou...
Bookmarks Related papers MentionsView impact
2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 2017
Wireless Sensor Networks (WSN) consist in a set ofsensor nodes that collect data in the environme... more Wireless Sensor Networks (WSN) consist in a set ofsensor nodes that collect data in the environment and send it to a Base Station that processes the final data. Some challenges may be found, such as minimizing energy consumption and maximize the network lifetime. Many protocols achieve energy savings through network clustering. This paper presents a new modeling graph using flow network to improve the routing protocols using the clustering technique, improving the routing of data between clusters-head, as well as by setting a time for a round in the clustering process. With this agnostic technique, our proposal may increase the network lifetime, balance the power consumption among the nodes and better distribute the data transmissions. Through simulations in network simulator Omnet++, Castalia, the proposal is validated and its efficiency is verified by comparing it to other protocols which work with clustering techniques.
Bookmarks Related papers MentionsView impact
Wireless Sensor Networks (WSN) consist in a set of nodes that collect information from the enviro... more Wireless Sensor Networks (WSN) consist in a set of nodes that collect information from the environment and send it to a Base Station that processes the final data. Some challenges in order to minimize the power consumption and maximize the network lifetime in this kind of networks can be found. This paper presents MH-LEACH, an algorithm that permits to establish a multi-hop communication between sensor nodes, which aims to save energy. Using MH-LEACH, a sensor will have options to transmit their data to closer nodes, always sending the collected data to the base station. This proposal was incorporated into the LEACH protocol being evaluated through simulations. The results show improvements in the approach when compared to the original version of LEACH. Keywords-Sensor networks; Multi-Hop communication; energy consumption;
Bookmarks Related papers MentionsView impact
Computer Standards & Interfaces, 2016
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2012
Bookmarks Related papers MentionsView impact
There are major challenges in establishing effective communications between nodes in vehicular ad... more There are major challenges in establishing effective communications between nodes in vehicular ad hoc networks (VANETs) that are subject to disconnections, hinder end-toend source and target connection. Another problem arises when VANETs are sparse, whereby communication between vehicles occurs after long periods of time causing delays. In these environments, traditional routing protocols proposed for VANETs suffer holding continuous connection and performance problems. To overcome these problems, Delay Tolerant Networks (DTN) for Interplanetary Networks (IPN) routing protocols, which encourages applications to use a minimized number of round trips are considered suitable alternatives. They are designed for storing and forwarding messages when nodes can find other nodes to maintain end-to-end connections. In our previous work, we proposed a routing protocol VDTN-ToD based on DTN which uses a metric Trend of Delivery (ToD) scheme to assist in its routing and forwarding decisions. In ...
Bookmarks Related papers MentionsView impact
With the increasing number of devices connected to the internet and scarcity of IPv4 addresses, t... more With the increasing number of devices connected to the internet and scarcity of IPv4 addresses, the IPv6 protocol was designed to address various of the limitations of IPv4 networks, supporting 128-bit addresses, deploying a fragmentation mechanism aiming better routers performance, use of multicast instead of broadcast and more. However, challenging security issues have been discovered on its design, with researches actively working to reduce the impact of cyber attacks exploring such breaches. One of these issues allows malicious IPv6 nodes to pretend they are actual gateways of a network, allowing for Denial-of-Service and Man-in-the-Middle attacks. This work proposes the Fingerprint-based Router Advertisement Guard (FibRA-Guard), a mechanism to avoid the spread of malicious Router Advertisements on wireless networks, relying on non-intrusive fingerprint authentication of sources of suspicious Router Advertisements based on the time each device takes to generate and send IPv6 packets. On a testbed with 15 devices, FibRA-Guard was able to identify sources of packets with an average accuracy of 96%, proving to be a reliable solution towards wireless IPv6 networks secured against malicious Router Advertisements.
Bookmarks Related papers MentionsView impact
During the last few years, smart homes became reality due to the popularization of Internet of Th... more During the last few years, smart homes became reality due to the popularization of Internet of Things (IoT). This kind of environment is composed of several types of IoT heterogeneous wireless devices, where each one has singular characteristics and a particular set of protocols. This fact makes the smart home very complex network to deploy new applications and services. Therefore, a smart home needs an approach to abstract the communication with these IoT devices, improving the flexibility and the manageability of the applications running on the top of the smart home, as well as the network infrastructure as a whole. Within this context, this paper proposes a middleware for communication abstraction of IoT devices in smart homes. The proposed middleware allows the communication with devices through a high-level interface, enabling the management of heterogeneous IoT devices as a generic interface. The experiments performed in a real testbed scenario suggest that the proposed middleware is scalable and improves the management of IoT devices.
Bookmarks Related papers MentionsView impact
2022 IEEE Symposium on Computers and Communications (ISCC), Jun 30, 2022
Bookmarks Related papers MentionsView impact
During the last few years, the aging of the people in society and the increasing cost of healthca... more During the last few years, the aging of the people in society and the increasing cost of healthcare arose the necessity of e-health systems as a suitable solution to maintain cost-effective high quality healthcare. The usage of e-health allows the real time collection and analysis of heterogeneous medical data on a large scale, since such data come from numerous patients. Usually, the analysis of such medical data needs to be fast to address time constraints of treatment, specially in severe sepsis or septic shock instances. Severe sepsis is the major cause of hospitalization, reaching high mortality rate, where early identification can reduce this mortality rate significantly. Information about infections, risk factors, patients demographic should be considered to develop comprehensive sepsis prevention tool for early recognition, and treatment strategies. Within this context, we propose an e-health system, called BE-SYS, to identify patients at high risk for septic shock based on the medical data collected as Big Data and rapidly analysed. Additionally, BE-SYS applies an iterative clustering approach to reduce both the scale of the problem and the amount of data analyzed, increasing the accuracy of diagnoses and complying with rapid responses to meet time constraints. The evaluation of the proposal using a real patient dataset shows that BE-SYS reaches high accuracy with very low response time analysis.
Bookmarks Related papers MentionsView impact
International Conference on Telecommunications, Jun 23, 2013
Bookmarks Related papers MentionsView impact
Modern society claims for smart environments (SEs) to make efficient the management of infrastruc... more Modern society claims for smart environments (SEs) to make efficient the management of infrastructures, resources, and services. However, SEs comprise numerous heterogeneous devices and follow different protocols, making it harder to detect network anomalous behavior. Hence, this paper proposes ISAD, an intelligent system for network anomaly detection in SE managing Fog and Cloud computing approaches, improving the data processing and traffic exchange of the system. The system evaluation takes as workload a real network traffic, deploying locally the Fog environment and using Microsoft Azure platform as Cloud. Results show that the system detects network anomalies with an accuracy of 96%.
Bookmarks Related papers MentionsView impact
Nowadays, Internet became a crucial tool for service delivery, enhancing network requirements. In... more Nowadays, Internet became a crucial tool for service delivery, enhancing network requirements. In this new scenario, through Internet Service Providers (ISPs) tend to evolve to Modern Internet Service Providers (MISPs), addressing situations such as elastic network resource demand that may cause problems of slowness, service interruption and constant disconnections. A promising approach to deal with elastic services is the usage of a network traffic prediction model, but traditional models do have all the necessary features to it. Within this context, this paper presents an adaptive network prediction model for MISPs that adjusts seasonality and trend and removes time series error cycles according to the behavior observed in network traffic. The results, using a real bandwidth data set, suggest that the proposed model improves the existing prediction models.
Bookmarks Related papers MentionsView impact
With organizations and individuals increasingly depending on the Internet, failures in subnetwork... more With organizations and individuals increasingly depending on the Internet, failures in subnetworks may affect important services such as for economic, health, educational and governmental purposes. Also, as the complexity of the Internet increases, efficient monitoring and automatic preventive measures play vital roles in avoiding network services interruption. In this work, we propose an alarm mechanism based on time series analysis, which monitors entire IP networks with low overhead and anticipates strong degradation of network performance. When applied on 9 operational Internet Protocol (IP) networks with nodes spread worldwide, our mechanism was able to anticipate cases of 100% loss 15 minutes earlier with more than 99% of Accuracy and less than 0.05% of FalsePositive Rate in the vast majority of the networks we tested with months of monitoring. In the worst case scenario we found, with Approximate Entropy (ApEn) indicating severely random behavior of loss measurements, our mechanism reached 96.5% of Accuracy and 2% of False-Positive Rate. Based on such encouraging results, we believe our alarm mechanism will support daily operations in IP networks, resulting in enhanced resiliency and enabling more intelligent service provisioning.
Bookmarks Related papers MentionsView impact
With the popularity of wireless devices, the possibility of implementing vehicular safety applica... more With the popularity of wireless devices, the possibility of implementing vehicular safety applications has been studied for years in the context of vehicular ad-hoc networks. Dedicated Short Range Communication (DSRC) is designed to serve the needs of vehicular safety applications. However, DSRC does not offer good enough coverage and range in highways for certain applications. Considering these drawbacks, LTE, an advanced cellular communication technology, is proposed as an alternative to DSRC. One problem is LTE capability to support regularly transmitted cooperative awareness messages due to high delay. Within this context, in this paper we propose a mechanism that uses a clustering approach in order to improve the wireless communications while using DSRC for intra-cluster communication and LTE for inter-cluster-communication. We show that our proposition improves the network performance while increasing the data packet delivery and decreasing the average delay.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Joaquim Celestino Jr.