Joel Rodrigues

Joel Rodrigues
Senac Faculty of Ceará

Ph.D.

About

1,274
Publications
547,442
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
36,430
Citations
Additional affiliations
May 2019 - present
Federal University of Piauí
Position
  • Professor
August 2016 - July 2019
Instituto Nacional de Telecomunicações
Position
  • Professor
January 2002 - present
Institute of Telecommunications
Position
  • Senior Researcher

Publications

Publications (1,274)
Article
In this letter, we present a novel Fuzzy-Layered Recurrent Neural Network (Fuzzy-LRNN) model for optimization of hybrid SimultaneousWireless Information and Power Transfer (SWIPT) in a cooperative communication scenario. At first, the Fuzzy rule set has been devised to obtain the initial estimates of time switching factor and power splitting, consi...
Article
Full-text available
The Internet of Things (IoT) based smart city applications are the latest technology-driven solutions designed to collect and analyze data to enhance the quality of life for urban residents by creating more sustainable, efficient, and connected communities. Communication nodes are networked independently to monitor the circumstances, where they req...
Article
Full-text available
Real-time digital twin technology can enhance traffic safety of intelligent vehicular system and provide scientific strategies for intelligent traffic management. At the same time, real-time digital twin depends on strong computation from vehicle side to cloud side. Aiming at the problem of delay caused by the dual dependency of timing and data bet...
Article
In recent era, the unmanned aerial vehicles (UAVs) commonly known as drones has emerged as a one of the most significant and promising tools which has demonstrated its wide range of implementations variating from commercial domain to the field of defense due to its distinct capabilities such as inspection, surveillance, precision and so forth. Inte...
Article
As smart home networks become increasingly complex and dynamic, maintaining trust between the various devices and services is crucial. Existing trust management approaches face challenges such as high computational overhead and difficulty in selecting optimal parameters. To address these challenges, we propose a new method for trust management in s...
Article
Full-text available
The potential of the Internet of Health Things (IoHT), also identified in the literature as the Internet of Medical Things (IoMT), is enormous, since it can generate expressive impacts on healthcare devices, such as the capnograph. When applied to mechanical ventilation, it provides essential healthcare to the patient and helps save lives. This sur...
Article
Fraud, misidentification, and adulteration of food, whether unintentional or purposeful, are a worldwide and growing concern. Aquaculture and fisheries are recognized as one of the sectors most vulnerable to food fraud. Besides, a series of risks related to health and distrust between consumer and popular market makes this sector develop an effecti...
Article
Full-text available
Fire accidents occur in every part of the world and cause a large number of casualties because of the risks involved in manually extinguishing the fire. In most cases, humans cannot detect and extinguish fire manually. Fire extinguishing robots with sophisticated functionalities are being rapidly developed nowadays, and most of these systems use fi...
Article
Using the powerful communication capability of 6G, various in-vehicle services in the Internet of Vehicles (IoV) can be offered with low delay, which provides users with a high-quality driving experience. Edge computing in 6G-enabled IoV utilizes edge servers distributed at the edge of the road, enabling rapid responses to delay-sensitive tasks. Ho...
Conference Paper
Integrated space-air-ground network (ISAGN) has been regarded as an important infrastructure of the next-generation network, which can offer massive access and seamless connections for users in a wide coverage area. This paper utilizes non-orthogonal multiple access (NOMA) technique to improve the spectrum efficiency of the ISAGN. Besides, two-way...
Article
Full-text available
Currently, high hospital readmission rates have become a problem for mental health services, because it is directly associated with the quality of patient care. The development of predictive models with machine learning algorithms allows the assessment of readmission risk in hospitals. The main objective of this paper is to predict the readmission...
Article
Full-text available
The articles in this special section focus on security, trust, and privacy solutions for intelligent Internet of Vehicular Things.
Article
With the help of social media indicators, this study offers a brand-new intelligent risk management model to enhance the security of cryptocurrency. Based on surveying the previous studies, we found most of them focused on employing many techniques to enhance virtual currencies' security. However, there is no study concentrated on mining threats de...
Article
Advances in the connected vehicle and cloud computing technologies, Big data, and artificial intelligence techniques have opened new research opportunities. We can integrate them to work out the issues originating from transportation complexities and offer improved services. In this work, we present a seamless multi-module multi-layer vehicular clo...
Article
Full-text available
Internet of Things (IoT) is bringing a revolution in today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous, providing autonomy to nodes so that they can communicate with other nodes and exchange information at any time. IoT and heal...
Article
Full-text available
The papers in this special section focus on artificial intelligence Internet of Things for medical things (AIoMT), with particular emphasis on medical sensors for remote patient monitoring and body area interfacing. Examines issues involving design and implementation, practice use, measurements, and patient monitoring.
Article
Mobile edge computing (MEC) can provision augmented computational capacity in proximity so as to better support Industrial Internet of Things (IIoT). Tasks from the IIoT devices can be outsourced and executed at the accessible computational access point (CAP). This computing paradigm enables the computing resources much closer to the IIoT devices,...
Article
With the advancement of information and communication technologies (ICTs), there has been high-scale utilization of IoT and adoption of AI in the transportation system to improve the utilization of energy, reduce greenhouse gas (GHG) emissions, increase quality of services, and provide many extensive benefits to the commuters and transportation aut...
Article
A digital-twin (DT)-enabled Internet of Medical Things (IoMT) system for telemedical simulation is developed, systematically integrated with mixed reality (MR), 5G cloud computing, and a generative adversarial network (GAN) to achieve remote lung cancer implementation. Patient-specific data from 90 lung cancer with pulmonary embolism (PE)-positive...
Article
With the exponential growth of connected Internet of Things (IoT) devices around the world, security protection and privacy preservation have risen to the forefront of design and development of innovative systems and services. For low-value IoT devices that identify and track billion of goods in various industries—such as radio-frequency identifica...
Article
Full-text available
This articles in this special section focus on the issues and challenges related to security, trust, and privacy (STP) for the Intelligent Internet of Vehicles (IoVT). The IoT evolution have given birth to several new groundbreaking applications, such as the IoVT, smart cities, and cyber-physical systems. For IoVT, the vehicles include various smar...
Article
As fundamental technical support to instantaneous E-healthcare services, Wireless Body Area Networks (WBANs) have attracted huge attention in the scientific and industrial community in recent years, which defines a unique wireless communication protocol for medical and healthcare circumstances. However, the concerns of the network and data security...
Article
Full-text available
Internet of Things (IoT) is considered nowadays as the most important and indispensable support to ensure all types of communication, over almost all sectors of activities. The specificity of each area, as well as its own requirements in terms of quality of service (QoS), make this communication difficult to ensure and thus face multiple challenges...
Article
Full-text available
Blockchain technology is popular due to properties such as immutability, transparency, distributed storage, and control decentralisation. Student certificates and skill verification are used for job applications and other purposes. Forgery of certificates with centralised authority is a major issue in online education. This challenge can be solved...
Article
Full-text available
With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral part of an IoT system. Authentication and access control are the two principal security requirements for ensuring authorized and restricted accesses to limited and essen...
Article
For the effective green communications amongst the vehicles, the energy-efficient routing protocol for intelligent transportation system (ITS) is essential. Due to the high speed and recurring topological variations of Vehicular sensor Networks, identifying a connected route with a sufficient latency is a difficult task with many constraints and ob...
Article
Unmanned aerial vehicles (UAVs) as an Aerial Base Station (ABS) are the enabler in the provisioning of emergency communication services. However, ABS unplanned deployment creates interference from the neighboring co-channel base station, which hinders meeting the required quality-of-service (QoS) requirements and the minimum rate of users. Hence, t...
Article
Full-text available
The growing demand for fresher and better quality food products has led various researchers to propose solutions in this field. Besides the increase in food production, the efficiency of food logistics must be improved to reduce waste. An efficient food supply chain also reduces the final cost of products, increases producers’ incomes, mitigates th...
Article
Full-text available
The correlations between smartphone sensors, algorithms, and relevant techniques are major components facilitating indoor localization and tracking in the absence of communication and localization standards. A major research gap can be noted in terms of explaining the connections between these components to clarify the impacts and issues of models...
Article
Full-text available
Amidst the global pandemic and catastrophe created by ‘COVID-19’, every research institution and scientist are doing their best efforts to invent or find the vaccine or medicine for the disease. The objective of this research is to design and develop a deep learning-based multi-modal for the screening of COVID-19 using chest radiographs and genomic...
Article
Internet of Cloud Things (IoCT) is a new era of technology introduced as an extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that allows access to the cloud that raises numerous privacy and security challenges. When devices access the cloud for storage or services that are provided by other cloud services, it...
Article
Full-text available
Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential information. The main objective of this work is to survey the literature to detect the existing techniques to protect against data leakage and to iden...
Article
Transactive energy is a next big thing in the energy sector which considerably transform the association between utility, consumer, and the environment. Transactive energy management (TEM) system comprises a collection of economical and controlling strategies which helps to dynamically balance the power infrastructure. Peer-to-Peer (P2P) trading be...
Article
The papers in this special section focus on artificial intelligence-enabled software defined industrial networks. With the development of intelligent manufacturing, new manufacturing modes such as personalized customization and networked collaboration have been widely developed. These new manufacturing modes require frequent data exchanges between...
Article
Full-text available
The primary objective of postquantum cryptography (also known as quantum‐resistant cryptography) is to develop the cryptographic systems that need to be robust against both quantum and classical computers, and can also interoperate with the existing communications protocols and networks. In an Internet of Things (IoT) environment, the communicated...
Article
The disruptive technology of unmanned aerial vehicles (UAVs), or drones, is a trend with increasing applications and practical relevance in the current and future society. Despite the common interest in drones for commercial deliveries, the use of this disruptive technology can be examined in the contexts of other world strategic demands such as cl...
Article
Full-text available
In the era of smart healthcare tremendous growing, plenty of smart devices facilitate cognitive computing for the purposes of lower cost, smarter diagnostic, etc. Android system has been widely used in the field of IoMT, and as the main operating system. However, Android malware is becoming one major security concern for healthcare, by the serious...
Article
Full-text available
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product (GDP) and as a source of employment. The past few decades have seen immense change in the operation of agricultural sector with the introduction of precision farming in conjunction with Inter-net of T...
Article
Full-text available
Signboard detection and recognition is an important task in automated context-aware marketing. Recently many scripting languages like Latin, Japanese, and Chinese have been effectively detected by several machine learning algorithms. As compared to other languages, outdoor Urdu text needs further attention in detection and recognition due to its cu...
Article
Full-text available
The advent of vehicular edge computing (VEC) has generated enormous attention in recent years. It pushes the computational resources in close proximity to the data sources and thus caters for the explosive growth of vehicular applications. Owing to the high mobility of vehicles, these applications are of latency-sensitive requirements in most cases...
Article
Full-text available
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards a more automated lifestyle. A significant amount of IoT devices is expected to join the network as IoT has allowed interconnection and transmission among global devices which has resulted in generation of enormous diverse data. There is a requirement for a r...
Article
Vehicle-to-grid (V2G) technology enables bidirectional energy flow between the electric vehicle and power grid thereby making the electric vehicle as a virtual power plant. This seamless exchange of energy flow is possible only when the entities involved communicate wirelessly in a secured manner. In order to ensure privacy-preserving in the V2G co...
Article
Today, a significant number of biomedical data is generated continuously from various biomedical equipment and experiments due to rapid technological improvements in medical sciences. Effective biomedical data analysis, such as extracting biological and diagnostically significant features, is a very challenging task. This paper proposes hybrid Mach...
Article
Role Back Access Control model (RBAC) allows devices to access cloud services after authentication of requests. However, it does not give priority in Big Data to devices located in certain geolocations. Regarding the crisis in a specific region, RBAC did not provide a facility to give priority access to such geolocations. In this paper, we planned...
Article
The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, facilitating to connect healthcare information technology system via the Internet. It is also called IoT in healthcare, facilitating secure communication of remote healthcare devices over the Internet for qu...
Article
An essential consideration in cyber-physical systems (CPS) is the ability to support secure communication services, such as points of interest (POI) microservices. Existing approaches to support secure POI microservices generally rely on anonymity and/or differential privacy technologies. There are, however, a number of known limitations with such...
Book
Full-text available
This book covers different applications, case studies, implementation and management of smart healthcare systems using Artificial Intelligence. It covers the fundamental ideas, applications, algorithms, protocols, emerging trends, problems, and research findings in the field of AI and IoT in smart healthcare. It also demonstrates new approaches to...
Article
Full-text available
Parkinson's disease (PD) is a neurological disease that has been reported to have affected most people worldwide. Recent research pointed out that about 90% of PD patients possess voice disorders. Motivated by this fact, many researchers proposed methods based on multiple types of speech data for PD prediction. However, these methods either face th...
Article
Full-text available
Respiratory diseases are one of the most common causes of death in the world and this recent COVID-19 pandemic is a key example. Problems such as infections, in general, affect many people and depending on the form of transmission they can spread throughout the world and weaken thousands of people. Two examples are severe acute respiratory syndrome...
Article
Full-text available
Parkinson’s disease (PD) is a neurological disease that has been reported to have affected most people worldwide. Recent research pointed out that about 90% of PD patients possess voice disorders. Motivated by this fact, many researchers proposed methods based on multiple types of speech data for PD prediction. However, these methods either face th...
Chapter
TheBCoTInternetIndustry 5.0 of Things Internet of Thingsis reforming Industry 5.0 to featured blockchainBlockchain-driven secure connectivity—fundamental characteristics of IoT IoTencounter challenges like decentralization, security vulnerabilities, and deprived interoperability. Blockchain-based centralized technology addresses the challenges of I...
Chapter
The advent of cloud computing has ensured a fertile soil for efficiently handling distributed computing. However, it calls for the provisioning of high-configuration infrastructure, including advanced servers and high-bandwidth networks for augmenting storage and computation-intensive services. To address this problem, IoT services have envisaged a...
Article
In the past decade, the Internet of Things (IoT) becomes essential in consumer and industrial applications. The accessibility of high bandwidth Internet connection particularly with the arrival of robust 5G networks rises to innovative IoT solutions such as smart city, automobiles, industry 4.0, etc. IoT analytics represents edge computing as a ter...
Chapter
In recent years, the use of Decision-Making Information System (DIS) has become a necessity for monitoring and maintaining a company’s performance. Several studies and contributions have been carried out in various fields. Most of solutions are not suitable for all the areas, and a little attention has been given to research. A lack of DISs is gene...
Chapter
Edge architectures have emerged as a solution for the development of Internet of Things (IoT) applications, especially in scenarios with ultra-low system latency requirements and a huge amount of data transmitted in the network. This architecture aims to decentralize systems and extend cloud resources to devices located at the edge of networks. Var...
Conference Paper
People need to breathe, and so do other living beings, including plants and animals. It is impossible to overlook the impact of air pollution on nature, human well-being, and concerned countries' economies. Monitoring of air pollution and future predictions of air quality have lately displayed a vital concern. There is a need to predict the air qua...
Article
Full-text available
With rapid development of voice control technology, making speech recognition more precisely in various IoT domains have been an intractable problem to be solved. Since there are various conversation scenes, understanding the context of a dialog scene is a key issue of voice control systems. However, the reality is available training data for dialo...
Article
Full-text available
Content-centric networking (CCN) has emerged as a promising future Internet architecture that brings effective content retrieval mechanism. In CCN, the contents are accessed using their names instead of searching for the host location in the network. To improve Quality-of-Service for the users, CCN offers the in-network caching capability that plac...
Article
The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance driving experience in vehicular ad-hoc networks (VANETs). In combination with 6G technology, high a...
Article
Full-text available
Complex network analysis helps in finding hidden patterns within a graph network. This concept is extended for knowledge graphs to identify hidden concepts using state-of-the-art network analysis techniques. In this paper, a profiling knowledge graph is analyzed to identify hidden concepts which result in the identification of implicit communities...