About
1,274
Publications
547,442
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
36,430
Citations
Introduction
Additional affiliations
May 2019 - present
Federal University of Piauí
Position
- Professor
August 2016 - July 2019
January 2002 - present
Publications
Publications (1,274)
In this letter, we present a novel Fuzzy-Layered Recurrent Neural Network (Fuzzy-LRNN) model for optimization of hybrid SimultaneousWireless Information and Power Transfer (SWIPT) in a cooperative communication scenario. At first, the Fuzzy rule set has been devised to obtain the initial estimates of time switching factor and power splitting, consi...
The Internet of Things (IoT) based smart city applications are the latest technology-driven solutions designed to collect and analyze data to enhance the quality of life for urban residents by creating more sustainable, efficient, and connected communities. Communication nodes are networked independently to monitor the circumstances, where they req...
Real-time digital twin technology can enhance traffic safety of intelligent vehicular system and provide scientific strategies for intelligent traffic management. At the same time, real-time digital twin depends on strong computation from vehicle side to cloud side. Aiming at the problem of delay caused by the dual dependency of timing and data bet...
In recent era, the unmanned aerial vehicles (UAVs) commonly known as drones has emerged as a one of the most significant and promising tools which has demonstrated its wide range of implementations variating from commercial domain to the field of defense due to its distinct capabilities such as inspection, surveillance, precision and so forth. Inte...
As smart home networks become increasingly complex and dynamic, maintaining trust between the various devices and services is crucial. Existing trust management approaches face challenges such as high computational overhead and difficulty in selecting optimal parameters. To address these challenges, we propose a new method for trust management in s...
The potential of the Internet of Health Things (IoHT), also identified in the literature as the Internet of Medical Things (IoMT), is enormous, since it can generate expressive impacts on healthcare devices, such as the capnograph. When applied to mechanical ventilation, it provides essential healthcare to the patient and helps save lives. This sur...
Fraud, misidentification, and adulteration of food, whether unintentional or purposeful, are a worldwide and growing concern. Aquaculture and fisheries are recognized as one of the sectors most vulnerable to food fraud. Besides, a series of risks related to health and distrust between consumer and popular market makes this sector develop an effecti...
Fire accidents occur in every part of the world and cause a large number of casualties because of the risks involved in manually extinguishing the fire. In most cases, humans cannot detect and extinguish fire manually. Fire extinguishing robots with sophisticated functionalities are being rapidly developed nowadays, and most of these systems use fi...
Using the powerful communication capability of 6G, various in-vehicle services in the Internet of Vehicles (IoV) can be offered with low delay, which provides users with a high-quality driving experience. Edge computing in 6G-enabled IoV utilizes edge servers distributed at the edge of the road, enabling rapid responses to delay-sensitive tasks. Ho...
Integrated space-air-ground network (ISAGN) has been regarded as an important infrastructure of the next-generation network, which can offer massive access and seamless connections for users in a wide coverage area. This paper utilizes non-orthogonal multiple access (NOMA) technique to improve the spectrum efficiency of the ISAGN. Besides, two-way...
Currently, high hospital readmission rates have become a problem for mental health services, because it is directly associated with the quality of patient care. The development of predictive models with machine learning algorithms allows the assessment of readmission risk in hospitals. The main objective of this paper is to predict the readmission...
The articles in this special section focus on security, trust, and privacy solutions for intelligent Internet of Vehicular Things.
With the help of social media indicators, this study offers a brand-new intelligent risk management model to enhance the security of cryptocurrency. Based on surveying the previous studies, we found most of them focused on employing many techniques to enhance virtual currencies' security. However, there is no study concentrated on mining threats de...
Advances in the connected vehicle and cloud computing technologies, Big data, and artificial intelligence techniques have opened new research opportunities. We can integrate them to work out the issues originating from transportation complexities and offer improved services. In this work, we present a seamless multi-module multi-layer vehicular clo...
Internet of Things (IoT) is bringing a revolution in today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous, providing autonomy to nodes so that they can communicate with other nodes and exchange information at any time. IoT and heal...
The papers in this special section focus on artificial intelligence Internet of Things for medical things (AIoMT), with particular emphasis on medical sensors for remote patient monitoring and body area interfacing. Examines issues involving design and implementation, practice use, measurements, and patient monitoring.
Mobile edge computing (MEC) can provision augmented computational capacity in proximity so as to better support Industrial Internet of Things (IIoT). Tasks from the IIoT devices can be outsourced and executed at the accessible computational access point (CAP). This computing paradigm enables the computing resources much closer to the IIoT devices,...
With the advancement of information and communication technologies (ICTs), there has been high-scale utilization of IoT and adoption of AI in the transportation system to improve the utilization of energy, reduce greenhouse gas (GHG) emissions, increase quality of services, and provide many extensive benefits to the commuters and transportation aut...
A digital-twin (DT)-enabled Internet of Medical Things (IoMT) system for telemedical simulation is developed, systematically integrated with mixed reality (MR), 5G cloud computing, and a generative adversarial network (GAN) to achieve remote lung cancer implementation. Patient-specific data from 90 lung cancer with pulmonary embolism (PE)-positive...
With the exponential growth of connected Internet of Things (IoT) devices around the world, security protection and privacy preservation have risen to the forefront of design and development of innovative systems and services. For low-value IoT devices that identify and track billion of goods in various industries—such as radio-frequency identifica...
This articles in this special section focus on the issues and challenges related to security, trust, and privacy (STP) for the Intelligent Internet of Vehicles (IoVT). The IoT evolution have given birth to several new groundbreaking applications, such as the IoVT, smart cities, and cyber-physical systems. For IoVT, the vehicles include various smar...
As fundamental technical support to instantaneous E-healthcare services, Wireless Body Area Networks (WBANs) have attracted huge attention in the scientific and industrial community in recent years, which defines a unique wireless communication protocol for medical and healthcare circumstances. However, the concerns of the network and data security...
Internet of Things (IoT) is considered nowadays as the most important and indispensable support to ensure all types of communication, over almost all sectors of activities. The specificity of each area, as well as its own requirements in terms of quality of service (QoS), make this communication difficult to ensure and thus face multiple challenges...
Blockchain technology is popular due to properties such as immutability, transparency, distributed storage, and control decentralisation. Student certificates and skill verification are used for job applications and other purposes. Forgery of certificates with centralised authority is a major issue in online education. This challenge can be solved...
With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral part of an IoT system. Authentication and access control are the two principal security requirements for ensuring authorized and restricted accesses to limited and essen...
For the effective green communications amongst the vehicles, the energy-efficient routing protocol for intelligent transportation system (ITS) is essential. Due to the high speed and recurring topological variations of Vehicular sensor Networks, identifying a connected route with a sufficient latency is a difficult task with many constraints and ob...
Unmanned aerial vehicles (UAVs) as an Aerial Base Station (ABS) are the enabler in the provisioning of emergency communication services. However, ABS unplanned deployment creates interference from the neighboring co-channel base station, which hinders meeting the required quality-of-service (QoS) requirements and the minimum rate of users. Hence, t...
The growing demand for fresher and better quality food products has led various researchers to propose solutions in this field. Besides the increase in food production, the efficiency of food logistics must be improved to reduce waste. An efficient food supply chain also reduces the final cost of products, increases producers’ incomes, mitigates th...
The correlations between smartphone sensors, algorithms, and relevant techniques are major components facilitating indoor localization and tracking in the absence of communication and localization standards. A major research gap can be noted in terms of explaining the connections between these components to clarify the impacts and issues of models...
Amidst the global pandemic and catastrophe created by ‘COVID-19’, every research institution and scientist are doing their best efforts to invent or find the vaccine or medicine for the disease. The objective of this research is to design and develop a deep learning-based multi-modal for the screening of COVID-19 using chest radiographs and genomic...
Internet of Cloud Things (IoCT) is a new era of technology introduced as an extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that allows access to the cloud that raises numerous privacy and security challenges. When devices access the cloud for storage or services that are provided by other cloud services, it...
Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential information. The main objective of this work is to survey the literature to detect the existing techniques to protect against data leakage and to iden...
Transactive energy is a next big thing in the energy sector which considerably transform the association between utility, consumer, and the environment. Transactive energy management (TEM) system comprises a collection of economical and controlling strategies which helps to dynamically balance the power infrastructure. Peer-to-Peer (P2P) trading be...
The papers in this special section focus on artificial intelligence-enabled software defined industrial networks. With the development of intelligent manufacturing, new manufacturing modes such as personalized customization and networked collaboration have been widely developed. These new manufacturing modes require frequent data exchanges between...
The primary objective of postquantum cryptography (also known as quantum‐resistant cryptography) is to develop the cryptographic systems that need to be robust against both quantum and classical computers, and can also interoperate with the existing communications protocols and networks. In an Internet of Things (IoT) environment, the communicated...
The disruptive technology of unmanned aerial vehicles (UAVs), or drones, is a trend with increasing applications and practical relevance in the current and future society. Despite the common interest in drones for commercial deliveries, the use of this disruptive technology can be examined in the contexts of other world strategic demands such as cl...
In the era of smart healthcare tremendous growing, plenty of smart devices facilitate cognitive computing for the purposes of lower cost, smarter diagnostic, etc. Android system has been widely used in the field of IoMT, and as the main operating system. However, Android malware is becoming one major security concern for healthcare, by the serious...
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product (GDP) and as a source of employment. The past few decades have seen immense change in the operation of agricultural sector with the introduction of precision farming in conjunction with Inter-net of T...
Signboard detection and recognition is an important task in automated context-aware marketing. Recently many scripting languages like Latin, Japanese, and Chinese have been effectively detected by several machine learning algorithms. As compared to other languages, outdoor Urdu text needs further attention in detection and recognition due to its cu...
The advent of vehicular edge computing (VEC) has generated enormous attention in recent years. It pushes the computational resources in close proximity to the data sources and thus caters for the explosive growth of vehicular applications. Owing to the high mobility of vehicles, these applications are of latency-sensitive requirements in most cases...
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards a more automated lifestyle. A significant amount of IoT devices is expected to join the network as IoT has allowed interconnection and transmission among global devices which has resulted in generation of enormous diverse data. There is a requirement for a r...
Vehicle-to-grid (V2G) technology enables bidirectional energy flow between the electric vehicle and power grid thereby making the electric vehicle as a virtual power plant. This seamless exchange of energy flow is possible only when the entities involved communicate wirelessly in a secured manner. In order to ensure privacy-preserving in the V2G co...
Today, a significant number of biomedical data is generated continuously from various biomedical equipment and experiments due to rapid technological improvements in medical sciences. Effective biomedical data analysis, such as extracting biological and diagnostically significant features, is a very challenging task. This paper proposes hybrid Mach...
Role Back Access Control model (RBAC) allows devices to access cloud services after authentication of requests. However, it does not give priority in Big Data to devices located in certain geolocations. Regarding the crisis in a specific region, RBAC did not provide a facility to give priority access to such geolocations. In this paper, we planned...
The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, facilitating to connect healthcare information technology system via the Internet. It is also called IoT in healthcare, facilitating secure communication of remote healthcare devices over the Internet for qu...
An essential consideration in cyber-physical systems (CPS) is the ability to support secure communication services, such as points of interest (POI) microservices. Existing approaches to support secure POI microservices generally rely on anonymity and/or differential privacy technologies. There are, however, a number of known limitations with such...
This book covers different applications, case studies, implementation and management of smart healthcare systems using Artificial Intelligence. It covers the fundamental ideas, applications, algorithms, protocols, emerging trends, problems, and research findings in the field of AI and IoT in smart healthcare. It also demonstrates new approaches to...
Parkinson's disease (PD) is a neurological disease that has been reported to have affected most people worldwide. Recent research pointed out that about 90% of PD patients possess voice disorders. Motivated by this fact, many researchers proposed methods based on multiple types of speech data for PD prediction. However, these methods either face th...
Respiratory diseases are one of the most common causes of death in the world and this recent COVID-19 pandemic is a key example. Problems such as infections, in general, affect many people and depending on the form of transmission they can spread throughout the world and weaken thousands of people. Two examples are severe acute respiratory syndrome...
Parkinson’s disease (PD) is a neurological disease that has been reported to have affected most people worldwide. Recent research pointed out that about 90% of PD patients possess voice disorders. Motivated by this fact, many researchers proposed methods based on multiple types of speech data for PD prediction. However, these methods either face th...
TheBCoTInternetIndustry 5.0 of Things Internet of Thingsis reforming Industry 5.0 to featured blockchainBlockchain-driven secure connectivity—fundamental characteristics of IoT IoTencounter challenges like decentralization, security vulnerabilities, and deprived interoperability. Blockchain-based centralized technology addresses the challenges of I...
The advent of cloud computing has ensured a fertile soil for efficiently handling distributed computing. However, it calls for the provisioning of high-configuration infrastructure, including advanced servers and high-bandwidth networks for augmenting storage and computation-intensive services. To address this problem, IoT services have envisaged a...
In the past decade, the Internet of Things (IoT) becomes essential in consumer and industrial applications. The accessibility of high bandwidth Internet connection particularly with the arrival of robust 5G networks rises to innovative IoT solutions such as smart city, automobiles, industry 4.0, etc. IoT analytics represents edge computing as a ter...
In recent years, the use of Decision-Making Information System (DIS) has become a necessity for monitoring and maintaining a company’s performance. Several studies and contributions have been carried out in various fields. Most of solutions are not suitable for all the areas, and a little attention has been given to research. A lack of DISs is gene...
Edge architectures have emerged as a solution for the development of Internet of Things (IoT) applications, especially in scenarios with ultra-low system latency requirements and a huge amount of data transmitted in the network. This architecture aims to decentralize systems and extend cloud resources to devices located at the edge of networks. Var...
People need to breathe, and so do other living beings, including plants and animals. It is impossible to overlook the impact of air pollution on nature, human well-being, and concerned countries' economies. Monitoring of air pollution and future predictions of air quality have lately displayed a vital concern. There is a need to predict the air qua...
With rapid development of voice control technology, making speech recognition more precisely in various IoT domains have been an intractable problem to be solved. Since there are various conversation scenes, understanding the context of a dialog scene is a key issue of voice control systems. However, the reality is available training data for dialo...
Content-centric networking (CCN) has emerged as a promising future Internet architecture that brings effective content retrieval mechanism. In CCN, the contents are accessed using their names instead of searching for the host location in the network. To improve Quality-of-Service for the users, CCN offers the in-network caching capability that plac...
The continuous growth to the 6G wireless communication technology overcomes storage, stringent computation, privacy and power constraints to make an efficient and intelligent next generation transportation system to alleviate traffic jams and enhance driving experience in vehicular ad-hoc networks (VANETs). In combination with 6G technology, high a...
Complex network analysis helps in finding hidden patterns within a graph network. This concept is extended for knowledge graphs to identify hidden concepts using state-of-the-art network analysis techniques. In this paper, a profiling knowledge graph is analyzed to identify hidden concepts which result in the identification of implicit communities...