Joel Rodrigues

Joel Rodrigues
Senac Faculty of Ceará

Ph.D.

About

1,069
Publications
415,079
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
24,784
Citations
Additional affiliations
May 2019 - present
Federal University of Piauí
Position
  • Professor
August 2016 - July 2019
Instituto Nacional de Telecomunicações
Position
  • Professor
January 2002 - present
Institute of Telecommunications
Position
  • Senior Researcher

Publications

Publications (1,069)
Book
Full-text available
This book covers different applications, case studies, implementation and management of smart healthcare systems using Artificial Intelligence. It covers the fundamental ideas, applications, algorithms, protocols, emerging trends, problems, and research findings in the field of AI and IoT in smart healthcare. It also demonstrates new approaches to...
Conference Paper
With a subtle rise in the vehicular traffic, it has become necessary for the users to be more aware of their surroundings. Vehicular AdHoc Network (VANET) provides a solution to connect these vehicles with the data centres to leverage this information for the benefit of the users. It renders end-to-end details for traffic flow monitoring and dynami...
Article
Full-text available
At present times, the drastic advancements in the 5G cellular and internet of things (IoT) technologies find useful in different applications of the healthcare sector. At the same time, COVID-19 is commonly spread from animals to persons, but today it is transmitting among persons by adapting the structure. It is a severe virus and inappropriately...
Article
Full-text available
The act of lending is based on trust in the borrower to honour the obligation of paying back the lender. Greater spreads on credit operations may help predict the expected recovery of the credit, based on the sufficiency and liquidity of the guarantee. This study aims to understand how predictive models can provide different estimations of expected...
Conference Paper
Analysis of human posture has many applications in the field of sports and medical science including patient monitoring, lifestyle analysis, elderly care etc. It is important to understand if a person is healthy (in terms of his everyday posture) or is suffering with a joint/bone disease as reflected by his incorrect posture. Many of the works in t...
Conference Paper
The segmentation of instances is a key topic in image processing and computer vision. There are numerous applications such as medical image analysis, video surveillance, image compression among others, in which its algorithms show significant results. Due to the COVID-19 pandemic, most countries have been affected mainly by their economy. In the fo...
Article
Full-text available
Early detection, early diagnosis and classification of the cancer type facilitates faster disease management of patients. Cervical cancer is fourth most pervasive cancer type which affects life of many people worldwide. The intent of this study is to automate cancer diagnosis and classification through deep learning techniques to ensure patients he...
Article
Full-text available
Cell classification refers to detecting normal and diseased cells from small amount of data. Sometimes, classification of cells becomes difficult because some cells fall into more than one categories/classes. Current state‐of‐the‐art cell classification methods have been developed on the bases of tumor cell classification but these methods cannot c...
Article
A smart city is a dynamic and sustainable urban system that provides a great quality of service to its residents by optimally managing its resources. In smart cities, low-frequency oscillations are a serious concern to the power system as they adversely affect system's stability. Moreover, power system stabilizers are inefficient due to their fixed...
Conference Paper
Full-text available
Device-to-device (D2D) communication is one of the promising technology of the fifth-generation (5G) network. In D2D, the devices are in close proximity to each other communicate directly with or without depending upon the base station (BS), resulting in large gain, low latency, and high energy efficiency. Also, it improves the spectral efficiency...
Conference Paper
With the advent of the Internet, the gaming industry has grown tremendously in business, which also raises concerns for cheating and unfair gameplay. In this paper, we propose a novel approach (GiNA) using Blockchain technology to address a few problems with online Peer-to-Peer (P2P) games. GiNA uses two different data packet transfer schemes to en...
Conference Paper
Increased vehicular flow on roads along with proposed deployment of autonomous vehicles has necessitated the need for accurate traffic forecasting so as to achieve effective route guidance, traffic management, public safety and congestion avoidance. Although a number of traffic forecasting algorithms have been proposed but most of these algorithms...
Conference Paper
An Artificial Intelligence (AI)-enabled and blockchain-driven Electronic Health Record (EHR) maintenance system has a tremendous potential to facilitate reliable, secure, and robust storage systems for EHRs. Such an EHR system would also facilitate researchers, doctors, and government authorities to access data for research, perform analytics, and...
Article
Full-text available
Ambient gas measurement is essential in diverse fields and applications, from preventing accidents, to air pollution warnings, and granting the correct gas mixture to patients in hospitals. Gas leakage can reach large proportions, affecting neighborhoods or even cities, causing enormous environmental impacts. The integration of gas sensors through...
Article
Full-text available
Fifth generation (5G) aims to connect massive devices with even higher reliability, lower latency and even faster transmission speed, which are vital for implementing the e-health systems. However, the current efforts on 5G e-health systems are still not enough to accomplish its full blueprint. In this article, we first discuss the related technolo...
Article
Internet of Things (IoT) is an expanded application of Internet, which are used to provide various services for users. Up to now, IoTs have received more attention, because it can provide ubiquitous connectivity for various devices. With the development of IoTs, its security has become a main issue. Attackers use various techniques to implement cyb...
Article
The continuous urbanization with extensive dynamic situations on evolving cities, urban, and suburban areas, it is not feasible to categorize the navigation as fastest route, toll-free, and other variants. Metropolitan areas are more prone to traffic congestion, lane blocking, accidents, etc., due to the overcrowding and dynamic change of commuters...
Article
Full-text available
The aim of this study is to design a layer structure of feed-forward artificial neural networks using the Morlet wavelet activation function for solving a class of pantograph differential Lane-Emden models. The Lane-Emden pantograph differential equation is one of the important kind of singular functional differential model. The numerical solutions...
Article
Full-text available
Museums have adapted their traditional ways of providing services with the advent of novel digital technologies to match up with the pace and growing needs of current industry revolution. Mixed Reality has revitalized interpretation of numerous domains by offering immersive experiences in digital and real world. In the proposed study, an attempt wa...
Article
The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement of omni-inclusiveness, HEs are expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In the absence of literature on security provisioning framework...
Book
Full-text available
https://www.noticebard.com/call-for-chapters-smart-health-technologies-for-covid-19-pandemic/
Article
Full-text available
Software-defined networking (SDN) is an agile, modern networking approach that facilitates innovations in the networking paradigm. The abstracted and centralized network operating system facilitates the network management and reduces operational expenditure (OPEX). The open nature and simplicity of the data-forwarding plane dramatically reduces cap...
Article
In this paper, we propose a region-based pricing scheme, named as RegPrice, for provisioning safety-related decisions dynamically to the end-users. Typically, heterogeneous type of sensor nodes are present in the device layer of Safe-aaS. Considering the case of safety in road transportation, we compute the fixed and variable costs incurred in proc...
Article
Smart connected vehicles are becoming standardized with the incorporation of information and communication technology. Connected vehicles are employed for surveillance and management of road traffic, navigation assistance, etc., by inheriting different analytical and communication techniques. With the Social Internet of Things (SIoT), interogrowthp...
Article
Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natural disaster monitoring, soil and crop analysis, and consumer product delivery). Drones have become...
Article
The massive growth of the Internet of Things (IoT) applications and the challenges of Cloud computing have increased the importance of Fog networks for timely processing the requests from delay-sensitive applications. A Fog network provides local aggregation, analysis, and processing of IoT requests that may or may not be time-critical. One of the...
Article
Full-text available
This article highlights the importance of Internet of Things (IoT) and 5G networks in sustainable cities, focusing on disaster management systems. It also discusses suitable 5G communication technologies in disaster affected and communications outage areas. The article surveys various potential emerging communication technologies such as IoT, devic...
Preprint
In a smart grid, efficient load management can help balance and reduce the burden on the national power grid and also minimize local operational electricity cost. Robust optimization is a technique that is used increasingly used in home energy management systems, where it is applied in the scheduling of household loads through demand side control....
Article
In a smart grid, efficient load management can help balance and reduce the burden on the nationalpower grid and also minimize local operational electricity cost. Robust optimization is a technique thatis used increasingly used in home energy management systems, where it is applied in the schedulingof household loads through demand side control. In...
Article
Due to the complexity of myocardial infarction (MI) waveform, most traditional automatic diagnosis models rarely detect it, while those able to detect MI often require high computing and storage capacity, rendering them unsuitable for portable devices. Therefore, in order for convenient real-time MI detection, it is essential to design lightweight...
Article
Full-text available
Recent advances in sensor technology; wearable computing, the Internet of Medical Things and wireless networks have given rise to research in unbiased healthcare and remote monitoring. Sensors are playing an important role in biomedical data acquisition and processing purposes. The body sensors generated big medical data and are providing patients...
Article
Rapid developments in industry 4.0, machine learning, and digital twins have introduced new latency, reliability, and processing restrictions in Industrial Internet of Things (IIoT) and mobile devices. However, using current Information and Communications Technology (ICT), it is difficult to optimally provide services that require high computing po...
Preprint
A smart city is a dynamic and sustainable urban system that provides a great quality of service to its residents by optimally managing its resources. In smart cities, low-frequency oscillations are a serious concern to the power system as they adversely affect system's stability. Moreover, power system stabilizers are inefficient due to their fixed...
Article
In the aftermath of disasters, localization of trapped victims is imperative to ensure their safety and rescue. This article presents a novel localization and path planning approach that uses unmanned aerial vehicles (UAVs). The UAVs can extract one-hop neighbor information from the devices that may have run out of power by using directed wireless...
Article
Virtual machine (VM) migration is an indispensable aspect of a virtualized cloud environment. It assists in resource management by dynamically relocating VMs from one physical machine to another. This is an essential aspect especially for big data applications that are prone to variable workloads and often demand relocation of resources in terms of...
Article
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access c...
Article
Internet of Drones (IoDs) is getting growing interest of researchers due to its applicability in wide range of applications for transportation, weather monitoring, emergency monitoring for flood, earth quake, healthcare and road hazards. To update the data about emergency situation, a real-time data sharing is mandatory. However, regular message tr...
Article
Full-text available
To provide reliable data storage and retrieval services to the end users, the cloud service provider implements secure data storage, sharing, and retrieval mechanisms. However, the aforesaid services provided by cloud have certain pitfalls, such as decision latency and real‐time data computation. To address these aforementioned problems, fog comput...
Conference Paper
This work proposes an Activity-Aware Data Rate Tuning (A2D) scheme for Wireless Body Area Network (WBAN), while considering the criticality of the physiological sensed data. We consider different physical activities of the patients and thereafter, compute their health criticality. Further, on the basis of the health criticality value, the data rate...
Article
With the massive growth of Internet-of-Things (IoT) devices, how to provide users with recommendation services in the IoT environment has become a research hotspot. Group discovery, as a prerequisite step of group recommendation that can be used to assist groups of users to select services in IoT-enriched environments, has an important impact on re...
Article
Full-text available
Internet of Things (IoT) is one of the fastest-growing technologies. With the deployment of massive and faster mobile networks, almost every daily-use item is connected to the Internet. IoT-enabled industrial multimedia environment is used for the collection and analysis of different types of multimedia data (i.e., images, videos, audios, etc.). Th...
Article
Internet of Vehicles (IoV), a distributed network involving connected vehicles and Vehicular Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet-connected entities in real time. The communications among these entities (e.g. vehicles, pedestrians, fleet management systems, and road-side infrastructure) take place v...
Article
Opportunism in the Internet of Things is the latest necessity arising in the IoT network communication development when we encompass a sustainable approach to routing. Such a requirement arises from the need for device-hop based networking to eliminate a dedicated end-to-end physical network for pervasive communication and promotes local data and c...
Article
Full-text available
Signboard detection and recognition is an important task in automated context-aware marketing. Recently many scripting languages like Latin, Japanese, and Chinese have been effectively detected by several machine learning algorithms. As compared to other languages, outdoor Urdu text needs further attention in detection and recognition due to its cu...
Conference Paper
Full-text available
With the development of Vehicle-to-everything (V2X) communication systems, the need to increase efficiency of the VANET or vehicular ad-hoc networks has risen. One of the methods of doing so is to improve the topology control, especially the dynamic topology. In this paper, we propose a V2X communication based mixed approach for dynamic topology co...
Article
Monitoring using drones is not just a civilian and military task, but it also concerns the agricultural sector, where it can play an important role in the context of smart agriculture. It seems to be a very valuable tool in the future. However, the optimal deployment of a set of monitoring drones is a very challenging problem; it is a NP-Hard probl...
Chapter
Delay and disruption tolerant networking (DTN) is an exciting research topic that has attracted increasing attention from many researchers. It focuses on the design, construction, performance evaluation, and application of architectures, services, and protocols to achieve interoperability between heterogeneous, intermittently connected networks whe...
Chapter
Vehicular networks have attracted increasing research interest due to their vast potential applications. However, the special characteristics of these networks bring a lot of challenges to developing reliable and efficient algorithms and protocols. This chapter discusses the issues associated with routing and data dissemination in vehicular network...
Article
Vehicular crowdsensing has been widely leveraged in the intelligent transportation systems to collect real-time traffic data. However, the data security and privacy preservation issues have not been well investigated for vehicular crowdsensing. This article proposes a blockchain-enabled vehicular crowdsensing system to protect user privacy and data...
Article
Full-text available
5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and...
Article
Full-text available
In Vehicular Ad-hoc Networks (VANET), vehicles act like mobile nodes for fetching, sharing, and disseminating important information related to vehicle safety, warning messages, emergency events, and passenger infotainment. Due to continuous information sharing of vehicles with their surrounding nodes, Road Side Units (RSUs), and infrastructures, th...
Article
Full-text available
Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th gener...
Article
Vehicle-to-vehicle communication assists road-side information exchange granting ease of access and sharing between users. The communication between the vehicles is short-lived due to interference and data congestion in the resource constraint medium. This manuscript introduces a linear adaptive congestion control (LACC) augmenting the benefits of...
Article
Full-text available
The industrial scenario is undergoing exponential changes, mainly due to the different technologies that emerge quickly and the ever increasing demand. As a consequence, the number of processing devices and systems in the industries’ architectures is also increasing. Entities connectivity, physical/virtual joint functioning, interactivity, interope...
Article
Full-text available
Human emotions are strongly coupled with physical and mental health of any individual. While emotions exbibit complex physiological and biological phenomenon, yet studies reveal that physiological signals can be used as an indirect measure of emotions. In unprecedented circumstances alike coronavirus (Covid-19) outbreak, a remote IoT enabled soluti...
Article
Full-text available
Android is an application platform for mobile devices. It comprises of the operating system, software framework and core programs. This platform uses permissions to hide precious information about the user from untrusted apps. However, to install an application, device feature usage permissions which is granted by the user. User has the ability to...
Article
Full-text available
Many devices on an Internet of Things (IoT) network have severe constraints on computing resources in terms of memory, processing, and power, which make these networks generally known as Low power and Lossy Networks (LLNs). Device mobility in these scenarios has several negative impacts on the network, particularly in terms of connectivity, as node...
Article
Full-text available
The rapid spread of Internet of Things (IoT) devices in recent years has driven the creation of a number of IoT middleware for enabling communication between devices using different standards and technologies. Such middleware facilitates the development of IoT solutions, allowing the developer to handle data and devices through middleware without t...
Article
The evolution of Internet of Things (IoT) led to the construction of many IoT middleware, a software that plays a key role since it supports the communication among devices, users, and applications. Although various solutions and studies were proposed they rarely address crucial privacy and security considerations, especially regarding the MQTT pro...
Conference Paper
Reductions in installation and storage costs have increased the demand for security systems, including video surveillance and digital authentication. The video surveillance systems, when monitored by humans, are subject to errors and are challenging to scale. Authentication systems can validate someone using a password or a card from another user....