Pedro Henrique Gomes

Pedro Henrique Gomes
Ericsson · Ericsson Research

Doctor of Philosophy

About

48
Publications
17,835
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,592
Citations
Introduction
Pedro Henrique Gomes currently works at the Department of Electrical Engineering, University of Southern California. Pedro does research in Telecommunications Engineering, Communication Engineering and Artificial Intelligence. Their most recent publication is 'Constructive Interference in 802.15.4: A Tutorial'.
Additional affiliations
August 2012 - July 2019
University of Southern California
Position
  • PhD Student

Publications

Publications (48)
Article
Transporting iron ore by conveyor belts is widely used in the mining industry. The measurement of the mass flow of ore is essential for equipment protection purposes, preventing the conveyor belts from being overloaded, and for operational control purposes, when accounting for the production of equipment during a period of time. The equipment most...
Article
Full-text available
End-to-End (E2E) services in beyond 5G (B5G) networks are expected to be built upon resources and services distributed in multi-domain, multi-technology environments. In such scenarios, key challenges around multi-domain management and collaboration need to be tackled. ETSI Zero-touch network and Service Management (ZSM) architectural framework pro...
Article
The research community has recently proposed several solutions based on modern programmable switches to detect entirely in the data plane the flows exceeding pre-determined thra eshold in a time window, i.e., Heavy Hitters (HH). This is commonly achieved by dividing the network stream into fixed time slots and identifying each separately without co...
Article
Closed loops are key enablers for automation that have been successfully used in many industries for long, and more recently for computing and networking applications. The Zero-touch network and service management (ZSM) framework introduced standardized components that allow the creation, execution, and governance of multiple closed loops, enabling...
Article
Full-text available
Autonomous management capability is the main pillar for paving Zero-touch Networks and efficiently deliver and operate use cases under the light of 5G requirements. To this end, Closed Control Loop (CCL), Intent-Based Networking (IBN), and Machine Learning (ML) are regarded as enablers to automatically executed all operational processes, ideally wi...
Article
Full-text available
Several studies in the field of human–computer interaction have focused on the importance of emotional factors related to the interaction of humans with computer systems. According to the knowledge of the users’ emotions, intelligent software can be developed for interacting and even influencing users. However, such a scenario is still a challenge...
Article
Full-text available
image We executed an experiment to show the variation of connectivity over time and over channels from a particular sensor node to two different neighbors. The experiment employs 40 sensor nodes in an indoor test bed. In the experiment, every node broadcast 100 packets, each with of 100 bytes size. When one particular node is transmitting, all othe...
Article
How realistic is the connectivity in a testbed? We answer this question by gathering connectivity measurements from 11 datasets, on both testbeds and real-world deployments. We propose a 5-point checklist to assess the realism of a testbed deployment and introduce a visual tool to evaluate the connectivity characteristics of a deployment.
Article
Constructive Interference (CI) can happen when multiple wireless devices send the same frame at the same time. If the time offset between the transmissions is less than 500 ns, a receiver will successfully decode the frame with high probability. CI can be useful for achieving low-latency communication or low-overhead flooding in a multi-hop low-pow...
Article
Full-text available
We consider a dynamic multichannel access problem, where multiple correlated channels follow an unknown joint Markov model. A user at each time slot selects a channel to transmit data and receives a reward based on the success or failure of the transmission. The objective is to find a policy that maximizes the expected long-term reward. The problem...
Preprint
We consider a dynamic multichannel access problem, where multiple correlated channels follow an unknown joint Markov model. A user at each time slot selects a channel to transmit data and receives a reward based on the success or failure of the transmission. The objective is to find a policy that maximizes the expected long-term reward. The problem...
Article
Several adaptive systems have been proposed that are based on the concepts of smart cities, which can be successfully adapted to natural disasters or other public safety concerns. Since these systems are embedded in a critical and dynamic environment, it is really important to have an infrastructure that is capable of providing real-time environmen...
Article
Full-text available
Emerging Industrial Internet of Things applications, such as smart factories, require reliable communication and robustness against interference from colocated wireless systems. To address these challenges, frequency-hopping spread spectrum has been used by different protocols, including IEEE802.15.4-2015 TSCH. Frequency-hopping spread spectrum can...
Article
Agricultural production has become a key factor for the stability of the world economy. The use of pesticides provides a more favorable environment for the crops in agricultural production. However, the uncontrolled and inappropriate use of pesticides affect the environment by polluting preserved areas and damaging ecosystems. In the precision agri...
Conference Paper
Full-text available
We consider the problem of dynamic multichannel access in a Wireless Sensor Network (WSN) containing N correlated channels, where the states of these channels follow a joint Markov model. A user at each time slot selects a channel to transmit a packet and receives a reward based on the success or failure of the transmission, which is dictated by th...
Conference Paper
Full-text available
Most of the nodes that compose the Internet of Things (IoT) are battery-operated, which makes energy efficiency a critical goal. However, more important than simply saving energy is consuming energy uniformly among the nodes. Imbalanced energy consumption may disrupt the network (energy hole problem). We present a solution that solves the network l...
Article
Brazil is an agricultural nation whose process of spraying pesticides is mainly carried out by using aircrafts. However, the use of aircrafts with on-board pilots has often resulted in chemicals being sprayed outside the intended areas. The precision required for spraying on crop fields is often impaired by external factors, like changes in wind sp...
Conference Paper
Full-text available
Natural disasters (e.g. floods, landslides and tsunamis) are phenomena that occur in several countries and cause a great deal of damage, as well as a serious loss of life and materials. Although very often these events cannot be avoided, their environments can be monitored and thus predictions can be made about their likely occurrence so that their...
Conference Paper
Full-text available
There is an increasing number of studies in the area of Human-Computer Interaction (HCI) that bears witness to the importance of taking account of emotional factors in interactions with computer systems. By getting to know the emotions of the users, it is possible for artificial agents to have an influence on human feelings with a view to stimulati...
Article
Full-text available
A wireless sensor network is liable to suffer faults for several reasons, which include faulty nodes or even the fact that nodes have been destroyed by a natural disaster, such as a flood. These faults can give rise to serious problems if WSNs do not have a reconfiguration mechanism at execution. It should be noted that many WSNs designed to detect...
Conference Paper
Full-text available
We present the design and implementation of Multi-Channel Collection (MCC) protocol , a high-rate multi-channel time-scheduled protocol for fair, real-time data collection in Wireless Sensor Networks (WSN). MCC incorporates sophisticated mechanisms for balanced routing tree formation, multiple frequency channel allocation and globally synchronized...
Article
Full-text available
This paper proposes an architecture for mobile wireless networks based on Radio-over-Fiber (RoF) technology. The architecture organizes cells in a multi-tier fashion, with different tiers covering areas with different radii lengths. Proposed optimization algorithm splits cells to improve network capacity in congested areas and merges cells when the...
Article
Full-text available
This paper presents a novel queue management mechanism for base stations in infrastructure IEEE 802.11 networks. The mechanism is transparent to high-level protocols and is compatible with the standard. Its effectiveness is illustrated by showing that it can ameliorate the RTT unfairness and the MAC anomaly problems in wired-cum-wireless networks.
Article
Full-text available
This article presents algorithms for the optimization of radio resources that can be implemented in dynamic mobile networks based on RoF. The algorithms are based on linear relaxation techniques for integer linear programming (ILP) problems. The formulation models a multi-tier structure of antennas with increasing radius. Considering this antenna s...
Conference Paper
Full-text available
This article presents a radio resource optimization model for Radio-over-Fiber (RoF) access networks. The proposed model arranges cells in a multi-tier fashion with increasing coverage radius. Considering the available structure of antennas the optimizer performs dynamic cell merging and cell splitting according to mobile users' demands for efficie...
Conference Paper
Full-text available
In this paper, we introduce a radio resource optimization model for Radio-over-Fiber (RoF) access networks. We propose a mixed integer programming model to minimize the network cost while providing service to all mobile users. The proposed architecture arranges cells in a multi-layer fashion, with cells in each layer providing different coverage ra...
Article
Full-text available
In order to the increasing demand for wireless connectivity and large coverage, Radio-over-Fiber (RoF) infrastructure has been suggested as a cost-effective solution for the provisioning of bandwidth in small cell size. In this article, we present an analysis of the use of RoF technology in IEEE 802.16 networks. The propagation delay introduced by...
Article
Full-text available
This article presents algorithms for the optimization of radio resources and proposes an optimization model that can be implemented in dynamic mobile networks based on RoF. The algorithms are based on linear relaxation technique for integer linear programming (ILP) problems. The formulation models a multi-tier structure of antennas with increasing...
Article
Full-text available
Due to the contention nature of Wi-Fi medium access control, several fairness issues exist. Moreover, the Access Point (AP) buffer space plays an important role in the provisioning of fairness to the flows. This paper presents a novel queue management technique designed to ameliorate fairness problems in Wi-Fi last mile networks. The proposed mecha...
Conference Paper
Full-text available
In this paper, we introduce a novel queue management technique for the buffer space at the base station of infrastructure 802.11 networks that considers mobile user's receiving characteristics. The maximum amount of the base station buffer that can be used by a given flow is updated proportionally to RTT, measured at the mobile nodes and sent to th...
Conference Paper
Full-text available
In order to the increasing demand for wireless connectivity and large coverage, Radio-over-Fiber (RoF) infrastructure has been suggested as a cost-effective solution for the provisioning of bandwidth in small cell size. In this article, we present an analysis of the use of RoF technology in IEEE 802.16 networks. The propagation delay introduced by...
Article
Full-text available
It is well known that the quality of real-time applications, like VoIP, in wireless networks suffers great degradation due to the signal instability in mobile environments. In this paper the quality of VoIP applications on WiFi networks is evaluated using an emulation system with variation of the test environment following the Rayleigh distribution...

Network

Cited By