
Dalton Cézane Gomes ValadaresInstituto Federal de Educação, Ciência e Tecnologia de Pernambuco (IFPE) | IFPE · Mechanical Engineering
Dalton Cézane Gomes Valadares
D.Sc.
About
46
Publications
10,010
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
86
Citations
Citations since 2017
Introduction
My current research interests are Internet of Things, Fog/Edge Computing, Software Engineering, Data Security/Privacy, VANETs and Wireless Networks.
Education
September 2016 - December 2020
March 2012 - June 2015
March 2010 - June 2011
Grupo Educacional Anglo-Americano
Field of study
- Project Management
Publications
Publications (46)
The Internet of Things (IoT) field has gained much attention from industry and academia, being the main subject for numerous research and development projects. Frequently, the dense amount of generated data from IoT applications is sent to a cloud service, that is responsible for processing and storage. Many of these applications demand security an...
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols a...
Internet of Things (IoT) scenarios commonly present security and privacy concerns, either due to the processing constraints of devices or the employment of external servers to process and store data, for instance, in cloud-based IoT applications. In this sense, to protect data and decrease user distrust in external entities, security technologies a...
Cloud services and fog-based solutions can improve the communication and processing efficiency of the Internet of Things (IoT). Cloud and fog servers offer more processing power to IoT solutions, enabling more complex tasks within reduced time frames, which could not be possible when relying solely on IoT devices. Cloud and fog computing benefits a...
Trusted Execution Environments have been applied to improve data security in many distinct application scenarios since they enable data processing in a separate and protected region of memory. To investigate how this technology has been applied to the different IoT scenarios, which commonly deal with specific characteristics such as device resource...
Enquanto os trabalhos de especificação, pesquisa e desenvolvimento para as redes 6G já se iniciam, a implantação das redes 5G já é realidade em alguns países. Uma das novidades do 5G é o MMTC (Massive Machine-Type Communication), que permitirá até 1 milhão de dispositivos conectados transmitindo pequenas quantidades de dados a baixas taxas de trans...
With the increasing adoption of the edge computing paradigm, including multi-access edge computing (MEC) in telecommunication scenarios, many works have explored the benefits of adopting it. Since MEC, in general, presents a reduction in latency and energy consumption compared to cloud computing, it has been applied to deploy artificial intelligenc...
The new coronavirus pandemic has brought disruption to the world. One of the significant dilemmas to be solved by countries, especially in underdeveloped ones, is the lack of mass testing for the population. An alternative to these tests is detecting the disease through the analysis of radiographic images. To process different types of images autom...
Internet of Things (IoT) devices are increasingly present in people's daily lives, collecting different types of data about the environment, user behavior, medical data, and others. Due to limited processing power, such devices share the collected data with cloud/fog environments, which raises concerns about users' privacy. To ensure privacy and co...
Risks are present in any software project. In particular, technological risks are complex, volatile, and difficult to predict accurately. Despite this, the literature is scarce about such risks. This paper address this gap by identifying technological risk factors and strategies to mitigate them in software projects. We conducted and analyzed semi-...
Software development has been considered a socio-technical activity over the past decades. Particularly, in the case of software engineering, the necessity to communicate effectively with stakeholders and team members has been progressively emphasized. Human resources play a critical role in the success of software projects. Many techniques, method...
The increasing integration of 5G, multi-access edge computing (MEC), and microservices, benefits the development of applications that demand low coupling, low communication latency, high scalability, and high availability. A usual scenario that deals with such requirements is a video application, either to process inference on video images or proce...
Due to the Internet of Things (IoT) devices' processing and memory constraints, the processing and analysis of data acquired by such devices are generally performed in a fog or cloud environment, which offers more processing power. When delegating data processing to third parties, it is necessary to ensure their confidentiality and their owners' pr...
Nowadays, users are delegating the data storage to cloud services, due to the virtually unlimited storage, change history, broadband connection, and high availability. Despite the benefits and facilities, it is necessary to pay extra attention to data confidentiality and users’ privacy, as numerous threats aim to collect such information in an unau...
Abstract: Cloud services and fog-based solutions can improve the communication and processing efficiency of the Internet of Things (IoT). Cloud and fog servers offer more processing power to IoT solutions, enabling more complex tasks within reduced time frames, which could not be possible when relying solely on IoT devices. Cloud and fog computing...
The “Internet of Things” (IoT) is a term used, for the first time, in 1999, by Kevin Ashton,
when speaking about the possibility of a connection between physical devices and the Internet. RFID (Radio Frequency Identification) was one of the main technologies used in that time, allowing objects tracking and identification, among other applications....
Measures are essential resources to improve quality and control costs during software development. One of the main factors for having successful software measurement programs is measure trustworthiness, defined as how much a user can trust a measure to use it with confidence. Such confidence enables the users to interpret them and use them for supp...
Software development has been considered a socio-technical activity over the past decades. Particularly, in the case of software engineering, the necessity to communicate effectively with stakeholders and team members has been progressively emphasized. Human resources play a critical role in the success of software projects. Many techniques, method...
Intelligent Software Engineering (ISE) is currently a hot topic in research. Besides being a promising field, it brings many challenges. Therefore, there is a need for guidelines to help researchers to build an ISE solution. The goal of this study is to identify patterns in developing ISE solutions. For this purpose, we analyzed 42 studies, using a...
The software industry is increasingly adopting agile software development (ASD). A characteristic of ASD is of focusing on people over processes. Given this, the literature presents models to evaluate teamwork quality for agile teams. Another perspective is to predict the team's behavior, given the members' personality. This study aims to evaluate...
In the industrial domain, wireless networks are among the most recommended, due to their low deployment cost, great flexibility, and by being less invasive to the environment. In the literature, little emphasis is given to the application of traditional IEEE 802.11a/b/g standards into industrial environments. We have evaluated the communication per...
Even the most reliable systems can still be subject to human errors. When the system is considered critical, failures can lead to huge losses. When trying to understand the causes of these losses, the emotional and behavioral aspects of the system operator are ignored, considering only technical information that the user has. The objective of this...
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing...
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing...
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols a...
In the industrial domain, wireless networks are among the most recommended, due to their low deployment cost, great flexibility, and by being less invasive to the environment. In the literature, little emphasis is given to the application of traditional IEEE 802.11a/b/g standards into industrial environments. We have evaluated the communication per...
A metodologia de ensino é a parte da pedagogia que estuda meios de organização da aprendizagem dos alunos e do seu controle, visando dar suporte ao processo de ensino/aprendizagem. Além disso, procura apresentar roteiros para diferentes situações didáticas, conforme a tendência pedagógica adotada pelo professor e/ou instituição. Apesar de sua relev...
This poster was presented at LANCOMM 2019. It contains the partial results of my PhD, already published at ISCC 2018. The idea of LANCOMM is discussing the work in progress of students. This poster was awarded as one of the 6 best works presented at the workshop.
ABSTRACT
This work intends to provide a Trusted IoT Architecture (TIoTA) to secure da...
With Industry 4.0 and Industrial Internet of Things (IIoT), new communication protocols are emerging or being updated. These protocols demand technological updates at industries, mainly related to their network infrastructures, and generally leading to large expenditures. Given that the 802.11g standard is a largely used communication protocol, mos...
With Industry 4.0 and Industrial Internet of Things (IIoT), new communication protocols are emerging or being updated. These protocols demand technological updates at industries, mainly related to their network infrastructures, and generally leading to large expenditures. Given that the 802.11g standard is a largely used communication protocol, mos...
Presentation of our paper in the 33-rd International Conference on Advanced Information Networking and Applications (AINA-2019).
This article describes the design of a mathematical model and the optimization of the
working space of a prototype with a parallel delta kinematic structure with three degrees of
freedom, with angled guides (the guides are above the joints). The mobile platform of the
delta should always move parallel to the base, due to the three links that connec...
This present paper proposes the construction and the PID position control of a
prototype with parallel kinematic structure, type delta linear with three degrees of freedom.
The physical structure was built on recycled materials, open-source architecture controller and software, and low-cost actuators. The set is driven by 24V current motors with PW...
This article describes the electromechanical design and position control of a prototype
with parallel kinematic delta structure with three degrees of freedom, with angled guides (the guides are above the joints). The mobile platform of the delta should always move parallel to the base, due to the three links that connect with the fixed base. The pr...
This is the presentation of our paper "Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX)" in the IEEE Symposium on Computer and Communications (ISCC 2018).
The Internet of Things (IoT) field has gained much attention from industry and academia, being the main subject for numerous research and development projects. Frequently, the dense amount of generated data from IoT applications is sent to a cloud service, that is responsible for processing and storage. Many of these applications demand security an...
Esse trabalho tem o objetivo de mensurar o desempenho de seis métodos numéricos iterativos de resolução de equações não lineares implementados no GNU Octave. Os métodos utilizados são: Bissecção, Falsa Posição, Falsa Posição Modificado, Ponto Fixo, Newton-Raphson e Secante. O GNU Octave foi utilizado por ser software livre e seguir o mesmo estilo d...
Neste artigo é apresentada uma ferramenta digital para auxílio ao aprendizado do gênero textual Cordel. Por meio de um portal web, profes-sores e alunos poderão criar cordéis, de forma colaborativa, bem como divulgar suas criações, ampliando o alcance deste rico gênero, hoje difundido apenas na forma impressa. Além do público acadêmico, a ferrament...
In industry, it is known that wireless networks are the most suitable, since they have low implementation cost, greater flexibility and are less invasive to the environment. In the literature, among the wireless network technologies applied in industrial environments, little attention is given to traditional 802.11a/b/g, known by the domestic use a...
This paper presents the study of signal smoothing techniques, in order to select the best for use in a specific type of problem: determination of oxidative stability, by the computational calculation of the induction period. The oxidative stability is one of the major quality parameters of biofuels. According to some established hypotheses and metr...
The study of techniques for determining and monitoring the quality of biofuels has become more important, because of the benefits of using this fuel instead of fossil fuels. This paper presents a new method for measuring the oxidative stability, which is one of the metrics that define the quality of a biofuel, as well a software architecture for mo...
This paper presents a system for analyzing the quality of biodiesel, through a new method of measuring oxidativestability. Its main component is a technique that makes use of ozone to accelerate the oxidation of the fuel, reducing,thus, the induction period, that is the parameter required for determining oxidative stability. Thanks to the reduction...
Distributed systems use communication protocols for exchanging messages. The validation of such systems takes into account fault tolerance strategies, which must be carefully tested. The observation of the behavior of the application under fault conditions can help refining the fault tolerance strategies themselves, anticipating the application beh...
Questions
Questions (2)
Projects
Projects (4)
The Future Connected Systems research group (FCS) aims to investigate, experiment and design protocols, frameworks and tools for next-generation connected systems, including solutions for the Internet of Things, Edge Computing and Mobile Networks (B5G). The focus is the exploration and integration of methods and techniques, such as Artificial Intelligence and Service Orchestration in connected systems, applied to real scenarios, such as Industry 4.0, Connected Health, Vehicle Networks, among others.
Provide protection for Cloud/Fog-based IoT sensitive data using Trusted Execution Environments.
Provide data confidentiality and integrity of the operating system through hardware-based security mechanisms.