Dalton Cézane Gomes Valadares

Dalton Cézane Gomes Valadares
Instituto Federal de Educação, Ciência e Tecnologia de Pernambuco (IFPE) | IFPE · Mechanical Engineering

D.Sc.

About

46
Publications
10,010
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
86
Citations
Citations since 2017
38 Research Items
85 Citations
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
Introduction
My current research interests are Internet of Things, Fog/Edge Computing, Software Engineering, Data Security/Privacy, VANETs and Wireless Networks.
Education
September 2016 - December 2020
Universidade Federal de Campina Grande (UFCG)
Field of study
  • Computer Science
March 2012 - June 2015
Universidade Federal de Campina Grande (UFCG)
Field of study
  • Computer Science
March 2010 - June 2011
Grupo Educacional Anglo-Americano
Grupo Educacional Anglo-Americano
Field of study
  • Project Management

Publications

Publications (46)
Conference Paper
Full-text available
The Internet of Things (IoT) field has gained much attention from industry and academia, being the main subject for numerous research and development projects. Frequently, the dense amount of generated data from IoT applications is sent to a cloud service, that is responsible for processing and storage. Many of these applications demand security an...
Article
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols a...
Article
Internet of Things (IoT) scenarios commonly present security and privacy concerns, either due to the processing constraints of devices or the employment of external servers to process and store data, for instance, in cloud-based IoT applications. In this sense, to protect data and decrease user distrust in external entities, security technologies a...
Conference Paper
Full-text available
Cloud services and fog-based solutions can improve the communication and processing efficiency of the Internet of Things (IoT). Cloud and fog servers offer more processing power to IoT solutions, enabling more complex tasks within reduced time frames, which could not be possible when relying solely on IoT devices. Cloud and fog computing benefits a...
Article
Full-text available
Trusted Execution Environments have been applied to improve data security in many distinct application scenarios since they enable data processing in a separate and protected region of memory. To investigate how this technology has been applied to the different IoT scenarios, which commonly deal with specific characteristics such as device resource...
Conference Paper
Full-text available
Enquanto os trabalhos de especificação, pesquisa e desenvolvimento para as redes 6G já se iniciam, a implantação das redes 5G já é realidade em alguns países. Uma das novidades do 5G é o MMTC (Massive Machine-Type Communication), que permitirá até 1 milhão de dispositivos conectados transmitindo pequenas quantidades de dados a baixas taxas de trans...
Article
Full-text available
With the increasing adoption of the edge computing paradigm, including multi-access edge computing (MEC) in telecommunication scenarios, many works have explored the benefits of adopting it. Since MEC, in general, presents a reduction in latency and energy consumption compared to cloud computing, it has been applied to deploy artificial intelligenc...
Conference Paper
Full-text available
The new coronavirus pandemic has brought disruption to the world. One of the significant dilemmas to be solved by countries, especially in underdeveloped ones, is the lack of mass testing for the population. An alternative to these tests is detecting the disease through the analysis of radiographic images. To process different types of images autom...
Article
Full-text available
Internet of Things (IoT) devices are increasingly present in people's daily lives, collecting different types of data about the environment, user behavior, medical data, and others. Due to limited processing power, such devices share the collected data with cloud/fog environments, which raises concerns about users' privacy. To ensure privacy and co...
Conference Paper
Risks are present in any software project. In particular, technological risks are complex, volatile, and difficult to predict accurately. Despite this, the literature is scarce about such risks. This paper address this gap by identifying technological risk factors and strategies to mitigate them in software projects. We conducted and analyzed semi-...
Chapter
Software development has been considered a socio-technical activity over the past decades. Particularly, in the case of software engineering, the necessity to communicate effectively with stakeholders and team members has been progressively emphasized. Human resources play a critical role in the success of software projects. Many techniques, method...
Conference Paper
Full-text available
The increasing integration of 5G, multi-access edge computing (MEC), and microservices, benefits the development of applications that demand low coupling, low communication latency, high scalability, and high availability. A usual scenario that deals with such requirements is a video application, either to process inference on video images or proce...
Conference Paper
Due to the Internet of Things (IoT) devices' processing and memory constraints, the processing and analysis of data acquired by such devices are generally performed in a fog or cloud environment, which offers more processing power. When delegating data processing to third parties, it is necessary to ensure their confidentiality and their owners' pr...
Chapter
Nowadays, users are delegating the data storage to cloud services, due to the virtually unlimited storage, change history, broadband connection, and high availability. Despite the benefits and facilities, it is necessary to pay extra attention to data confidentiality and users’ privacy, as numerous threats aim to collect such information in an unau...
Preprint
Full-text available
Abstract: Cloud services and fog-based solutions can improve the communication and processing efficiency of the Internet of Things (IoT). Cloud and fog servers offer more processing power to IoT solutions, enabling more complex tasks within reduced time frames, which could not be possible when relying solely on IoT devices. Cloud and fog computing...
Thesis
Full-text available
The “Internet of Things” (IoT) is a term used, for the first time, in 1999, by Kevin Ashton, when speaking about the possibility of a connection between physical devices and the Internet. RFID (Radio Frequency Identification) was one of the main technologies used in that time, allowing objects tracking and identification, among other applications....
Article
Full-text available
Measures are essential resources to improve quality and control costs during software development. One of the main factors for having successful software measurement programs is measure trustworthiness, defined as how much a user can trust a measure to use it with confidence. Such confidence enables the users to interpret them and use them for supp...
Chapter
Software development has been considered a socio-technical activity over the past decades. Particularly, in the case of software engineering, the necessity to communicate effectively with stakeholders and team members has been progressively emphasized. Human resources play a critical role in the success of software projects. Many techniques, method...
Conference Paper
Full-text available
Intelligent Software Engineering (ISE) is currently a hot topic in research. Besides being a promising field, it brings many challenges. Therefore, there is a need for guidelines to help researchers to build an ISE solution. The goal of this study is to identify patterns in developing ISE solutions. For this purpose, we analyzed 42 studies, using a...
Conference Paper
Full-text available
The software industry is increasingly adopting agile software development (ASD). A characteristic of ASD is of focusing on people over processes. Given this, the literature presents models to evaluate teamwork quality for agile teams. Another perspective is to predict the team's behavior, given the members' personality. This study aims to evaluate...
Article
In the industrial domain, wireless networks are among the most recommended, due to their low deployment cost, great flexibility, and by being less invasive to the environment. In the literature, little emphasis is given to the application of traditional IEEE 802.11a/b/g standards into industrial environments. We have evaluated the communication per...
Article
Even the most reliable systems can still be subject to human errors. When the system is considered critical, failures can lead to huge losses. When trying to understand the causes of these losses, the emotional and behavioral aspects of the system operator are ignored, considering only technical information that the user has. The objective of this...
Conference Paper
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing...
Preprint
Full-text available
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing...
Preprint
Full-text available
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols a...
Preprint
Full-text available
In the industrial domain, wireless networks are among the most recommended, due to their low deployment cost, great flexibility, and by being less invasive to the environment. In the literature, little emphasis is given to the application of traditional IEEE 802.11a/b/g standards into industrial environments. We have evaluated the communication per...
Chapter
Full-text available
A metodologia de ensino é a parte da pedagogia que estuda meios de organização da aprendizagem dos alunos e do seu controle, visando dar suporte ao processo de ensino/aprendizagem. Além disso, procura apresentar roteiros para diferentes situações didáticas, conforme a tendência pedagógica adotada pelo professor e/ou instituição. Apesar de sua relev...
Poster
Full-text available
This poster was presented at LANCOMM 2019. It contains the partial results of my PhD, already published at ISCC 2018. The idea of LANCOMM is discussing the work in progress of students. This poster was awarded as one of the 6 best works presented at the workshop. ABSTRACT This work intends to provide a Trusted IoT Architecture (TIoTA) to secure da...
Chapter
With Industry 4.0 and Industrial Internet of Things (IIoT), new communication protocols are emerging or being updated. These protocols demand technological updates at industries, mainly related to their network infrastructures, and generally leading to large expenditures. Given that the 802.11g standard is a largely used communication protocol, mos...
Conference Paper
Full-text available
With Industry 4.0 and Industrial Internet of Things (IIoT), new communication protocols are emerging or being updated. These protocols demand technological updates at industries, mainly related to their network infrastructures, and generally leading to large expenditures. Given that the 802.11g standard is a largely used communication protocol, mos...
Presentation
Full-text available
Presentation of our paper in the 33-rd International Conference on Advanced Information Networking and Applications (AINA-2019).
Conference Paper
Full-text available
This article describes the design of a mathematical model and the optimization of the working space of a prototype with a parallel delta kinematic structure with three degrees of freedom, with angled guides (the guides are above the joints). The mobile platform of the delta should always move parallel to the base, due to the three links that connec...
Conference Paper
Full-text available
This present paper proposes the construction and the PID position control of a prototype with parallel kinematic structure, type delta linear with three degrees of freedom. The physical structure was built on recycled materials, open-source architecture controller and software, and low-cost actuators. The set is driven by 24V current motors with PW...
Conference Paper
Full-text available
This article describes the electromechanical design and position control of a prototype with parallel kinematic delta structure with three degrees of freedom, with angled guides (the guides are above the joints). The mobile platform of the delta should always move parallel to the base, due to the three links that connect with the fixed base. The pr...
Presentation
Full-text available
This is the presentation of our paper "Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX)" in the IEEE Symposium on Computer and Communications (ISCC 2018).
Preprint
Full-text available
The Internet of Things (IoT) field has gained much attention from industry and academia, being the main subject for numerous research and development projects. Frequently, the dense amount of generated data from IoT applications is sent to a cloud service, that is responsible for processing and storage. Many of these applications demand security an...
Conference Paper
Full-text available
Esse trabalho tem o objetivo de mensurar o desempenho de seis métodos numéricos iterativos de resolução de equações não lineares implementados no GNU Octave. Os métodos utilizados são: Bissecção, Falsa Posição, Falsa Posição Modificado, Ponto Fixo, Newton-Raphson e Secante. O GNU Octave foi utilizado por ser software livre e seguir o mesmo estilo d...
Poster
Full-text available
Neste artigo é apresentada uma ferramenta digital para auxílio ao aprendizado do gênero textual Cordel. Por meio de um portal web, profes-sores e alunos poderão criar cordéis, de forma colaborativa, bem como divulgar suas criações, ampliando o alcance deste rico gênero, hoje difundido apenas na forma impressa. Além do público acadêmico, a ferrament...
Thesis
Full-text available
In industry, it is known that wireless networks are the most suitable, since they have low implementation cost, greater flexibility and are less invasive to the environment. In the literature, among the wireless network technologies applied in industrial environments, little attention is given to traditional 802.11a/b/g, known by the domestic use a...
Article
Full-text available
This paper presents the study of signal smoothing techniques, in order to select the best for use in a specific type of problem: determination of oxidative stability, by the computational calculation of the induction period. The oxidative stability is one of the major quality parameters of biofuels. According to some established hypotheses and metr...
Conference Paper
Full-text available
The study of techniques for determining and monitoring the quality of biofuels has become more important, because of the benefits of using this fuel instead of fossil fuels. This paper presents a new method for measuring the oxidative stability, which is one of the metrics that define the quality of a biofuel, as well a software architecture for mo...
Conference Paper
Full-text available
This paper presents a system for analyzing the quality of biodiesel, through a new method of measuring oxidativestability. Its main component is a technique that makes use of ozone to accelerate the oxidation of the fuel, reducing,thus, the induction period, that is the parameter required for determining oxidative stability. Thanks to the reduction...
Conference Paper
Full-text available
Distributed systems use communication protocols for exchanging messages. The validation of such systems takes into account fault tolerance strategies, which must be carefully tested. The observation of the behavior of the application under fault conditions can help refining the fault tolerance strategies themselves, anticipating the application beh...

Questions

Questions (2)

Network

Cited By

Projects

Projects (4)
Project
The Future Connected Systems research group (FCS) aims to investigate, experiment and design protocols, frameworks and tools for next-generation connected systems, including solutions for the Internet of Things, Edge Computing and Mobile Networks (B5G). The focus is the exploration and integration of methods and techniques, such as Artificial Intelligence and Service Orchestration in connected systems, applied to real scenarios, such as Industry 4.0, Connected Health, Vehicle Networks, among others.
Project
Provide protection for Cloud/Fog-based IoT sensitive data using Trusted Execution Environments.
Project
Provide data confidentiality and integrity of the operating system through hardware-based security mechanisms.