15 results on '"Jamhour, Edgard"'
Search Results
2. Modeling a multi-queue network node with a fuzzy predictor
- Author
-
Jamhour, Edgard, Penna, Manoel C., Nabhen, Ricardo, and Pujolle, Guy
- Published
- 2009
- Full Text
- View/download PDF
3. A Tunable Fraud Detection System for Advanced Metering Infrastructure Using Short-Lived Patterns.
- Author
-
Zanetti, Marcelo, Jamhour, Edgard, Pellenz, Marcelo, Penna, Manoel, Zambenedetti, Voldi, and Chueiri, Ivan
- Abstract
We propose a fraud detection systems (FDS) for advanced metering infrastructure based on anomaly detection on the energy consumption reports from smart meters. Fraud inspection is triggered when a discrepancy between the energy supplied by the grid and that reported by smart meters is detected. We use an innovative approach, where consumption reports registered shortly before and after the discrepancy detection are compared to detect a fraud. Our FDS introduces an important innovation by showing that it is possible to use only a small set of recent measures to define a consumption pattern. We call these patterns short-lived because they are expected to represent the behavior of a consumer for a short period, only enough to detect an ongoing fraud. This approach allows the FDS to account for natural changes in the consumption behavior of users and also helps to preserve their privacy. The FDS can be tuned, using an optimization procedure, by imposing constraints on the true or false alarm rates, or maximizing an objective function that represents the revenue of the utility. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
4. A Power Planning Algorithm Based on RPL for AMI Wireless Sensor Networks.
- Author
-
Miguel, Marcio L. F., Jamhour, Edgard, Pellenz, Marcelo E., and Penna, Manoel C.
- Subjects
- *
WIRELESS sensor networks , *TWO-way communication , *SMART power grids , *WATER meters , *GAS-meters , *ELECTRIC meters - Abstract
The advanced metering infrastructure (AMI) is an architecture for two-way communication between electric, gas and water meters and city utilities. The AMI network is a wireless sensor network that provides communication for metering devices in the neighborhood area of the smart grid. Recently, the applicability of a routing protocol for low-power and lossy networks (RPL) has been considered in AMI networks. Some studies in the literature have pointed out problems with RPL, including sub-optimal path selection and instability. In this paper, we defend the viewpoint that careful planning of the transmission power in wireless RPL networks can significantly reduce the pointed problems. This paper presents a method for planning the transmission power in order to assure that, after convergence, the size of the parent set of the RPL nodes is as close as possible to a predefined size. Another important feature is that all nodes in the parent set offer connectivity through links of similar quality. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
5. Energy-Efficient Channel Coding Strategy for Underwater Acoustic Networks.
- Author
-
Barreto, Grasielli, Simão, Daniel H., Pellenz, Marcelo E., Souza, Richard D., Jamhour, Edgard, Penna, Manoel C., Brante, Glauber, and Chang, Bruno S.
- Subjects
UNDERWATER acoustic communication ,TRANSMISSION of sound ,SIGNAL-to-noise ratio ,ENERGY consumption ,MODULATION coding - Abstract
Underwater acoustic networks (UAN) allow for efficiently exploiting and monitoring the sub-aquatic environment. These networks are characterized by long propagation delays, error-prone channels and half-duplex communication. In this paper, we address the problem of energy-efficient communication through the use of optimized channel coding parameters. We consider a two-layer encoding scheme employing forward error correction (FEC) codes and fountain codes (FC) for UAN scenarios without feedback channels. We model and evaluate the energy consumption of different channel coding schemes for a K-distributed multipath channel. The parameters of the FEC encoding layer are optimized by selecting the optimal error correction capability and the code block size. The results show the best parameter choice as a function of the link distance and received signal-to-noise ratio. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. A Power Assignment Method for Multi-sink WSN with Outage Probability Constraints.
- Author
-
Pellenz, Marcelo E., Jamhour, Edgard, Penna, Manoel C., Souza, Richard Demo, and Brante, Glauber
- Published
- 2014
- Full Text
- View/download PDF
7. A Clustered SDN Architecture for Large Scale WSON.
- Author
-
Penna, Manoel Camillo, Jamhour, Edgard, and Miguel, Marcio L.F.
- Published
- 2014
- Full Text
- View/download PDF
8. An Efficient Distributed Algorithm for Constructing Spanning Trees in Wireless Sensor Networks.
- Author
-
Lachowski, Rosana, Pellenz, Marcelo E., Penna, Manoel C., Jamhour, Edgard, and Souza, Richard D.
- Subjects
DISTRIBUTED algorithms ,SPANNING trees ,WIRELESS sensor networks ,ROUTING (Computer network management) ,AD hoc computer networks - Abstract
Monitoring and data collection are the two main functions in wireless sensor networks (WSNs). Collected data are generally transmitted via multihop communication to a special node, called the sink. While in a typical WSN, nodes have a sink node as the final destination for the data traffic, in an ad hoc network, nodes need to communicate with each other. For this reason, routing protocols for ad hoc networks are inefficient forWSNs. Trees, on the other hand, are classic routing structures explicitly or implicitly used in WSNs. In this work, we implement and evaluate distributed algorithms for constructing routing trees in WSNs described in the literature. After identifying the drawbacks and advantages of these algorithms, we propose a new algorithm for constructing spanning trees in WSNs. The performance of the proposed algorithm and the quality of the constructed tree were evaluated in different network scenarios. The results showed that the proposed algorithm is a more efficient solution. Furthermore, the algorithm provides multiple routes to the sensor nodes to be used as mechanisms for fault tolerance and load balancing. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
9. Channel allocation algorithms for co-existence of base stations in IEEE 802.22 networks.
- Author
-
Mariani, Wagner C., Penna, Manoel Camillo, Pellenz, Marcelo E., and Jamhour, Edgard
- Subjects
BANDWIDTH allocation ,ALGORITHMS ,IEEE 802 standard ,BROADCASTING industry ,COGNITIVE ability ,WIRELESS sensor networks - Abstract
The purpose of the Wireless Regional Area Networks (WRANs) is to allow the use of spectrum allocated for television broadcasting in areas with sparse users, ensuring no interference with licensed operators. Cognitive radios using the IEEE 802.22 standard should monitor the environment to not cause interference in primary operators. When multiple WRANs intend to operate on the same set of frequencies in overlapping areas, the 802.22 standard provides mechanisms for their co-existence and provides a temporal multiplexing scheme to solve this problem. We propose three channel allocation algorithms to support the co-existence of potentially interfering WRANs. The proposed algorithms are based on graph coloring, and the innovation is to consider the demand for bandwidth from each WRAN, maintaining proportionality between the demand for frequencies of each WRAN and what is actually allocated. The algorithms are evaluated and it is concluded that they can efficiently assign channels to WRAN taking into account the bandwidth needs of each network. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
10. An outage-based method for planning wireless sensor mesh networks.
- Author
-
Pellenz, Marcelo, Jamhour, Edgard, Pereira, Marcos Heyse, and Demo Souza, Richard
- Abstract
The coverage area of wireless sensor networks (WSN) can be extended using the mesh topology, where intermediate nodes can act as routers to create a multi-hop path between a sensor node and the gateway. The mesh topology is specially useful to deploy WSN over large areas, to support the demand for novel applications to smart grid and smart cities. Multi-hop paths can significantly reduce the overall network capacity, because a same packet is re-transmitted stealing transmission time of the wireless channel of all nodes that are in the same contention domain. Thus, to improve the network capacity, short paths in terms of hops are desirable. However, when the number of hops is reduced, packets have to traverse longer distances without regeneration, increasing the probability of packet loss due to large and small scale propagation effects of the wireless channel. Lost packets need to be retransmitted also stealing time of the wireless channel. In this paper, we formulate a wireless capacity model for WSN that uses a Nakagami-m fading model, to evaluate retransmissions due to packet outage, and a contention model required to evaluate multi-hop paths in WSN. Using our model, we propose a method to the optimal planning of routes in WSN mesh topologies with or without outage constraints. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
11. A state-based availability model to shared mesh protection in MPLS-TP networks with preemption support.
- Author
-
Jamhour, Edgard and Penna, Manoel Camillo
- Abstract
The emerging MPLS-TP standard defines new and important recovery requirements for networks deployed with the MPLS technology. MPLS provides several facilities to support protection, but many parameters such as holding and setup priorities as well as the amount of spare capacity must be configured in order to achieve the desired protection level. In this direction, this paper proposes a state-based availability model to help the design of shared-mesh protection schemes for packed-switched paths deployed using MPLS technology. The steady-state probabilities of failure-states in a network can be determined using the MTBF and MTTR of the physical links and other components. Based on this information, the state-based model determines the impact of each failure-state on the availability of all protected paths transported by the network. Using our model, we propose a backup resource planning algorithm that computes the minimum spare capacity required to achieve the desired availability of all protected paths, as well as the strategy for assigning priorities to the backup paths. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
12. A reversible CTMC model for availability analysis of shared mesh restoration schemes for WDM networks.
- Author
-
Jamhour, Edgard and Penna, Manoel Camillo
- Subjects
- *
MESH networks , *INFORMATION sharing , *SCHEME programming language , *WAVELENGTH division multiplexing , *COMPUTER algorithms , *MARKOV processes - Abstract
We propose an efficient algorithm based on continuous-time Markov chain to compute the availability of network connections protected by shared recovery schemes in optical networks. The shared schemes are widely used to improve the availability without excessively expending network resources. The basic idea consists to share the recovery resources between two or more connections in order to reduce the amount of extra resources. This approach assumes that only a limited number of simultaneous failures that overlaps may happen in the network. In the presence of overlapping failures that affect simultaneously many connections, some may not be recovered, determining a reduction on their availability. The order in which overlapping failures occur is important because the first affected connection will acquire the shared resources, preventing the remaining connections to activate the recovery. The algorithm proposed in this paper significantly simplifies the calculation of the steady-state vector. We show that our approach is computationally more efficient and more accurate than the traditional approach used in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
13. Multi-constraint security policies for delegated firewall administration.
- Author
-
Kropiwiec, Cássio Ditzel, Jamhour, Edgard, Penna, Manoel Camillo, and Pujolle, Guy
- Published
- 2011
- Full Text
- View/download PDF
14. ICENET: An Information Centric Protocol for Big Data Wireless Sensor Networks.
- Author
-
Lachowski, Rosana, Pellenz, Marcelo E., Jamhour, Edgard, Penna, Manoel C., Brante, Glauber, Moritz, Guilherme, and Souza, Richard D.
- Subjects
BIG data ,INFORMATION services ,WIRELESS sensor networks ,INTERNET of things ,COMPUTER network protocols - Abstract
Wireless Sensors Networks (WSNs) are an essential element of the Internet of Things (IoT), and are the main producers of big data. Collecting a huge amount of data produced by a resource-constrained network is a very difficult task, presenting several challenges. Big data gathering involves not only periodic data sensing, but also the forwarding of queries and commands to the network. Conventional network protocols present unfeasible strategies for large-scale networks and may not be directly applicable to IoT environments. Information-Centric Networking is a revolutionary paradigm that can overcome such big data gathering challenges. In this work, we propose a soft-state information-centric protocol, ICENET (Information Centric protocol for sEnsor NETworks), for big data gathering in large-scale WSNs. ICENET can efficiently propagate user queries in a wireless network by using a soft-state recovery mechanism for lossy links. The scalability of our solution is evaluated in different network scenarios. Results show that the proposed protocol presents approximately 84% less overhead and a higher data delivery rate than the CoAP (Constrained Application Protocol), which is a popular protocol for IoT environments. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
15. SDN Architecture for 6LoWPAN Wireless Sensor Networks.
- Author
-
Miguel, Marcio L. F., Jamhour, Edgard, Pellenz, Marcelo E., and Penna, Manoel C.
- Subjects
- *
SOFTWARE-defined networking , *WIRELESS sensor networks , *COMPUTER architecture , *DATA acquisition systems , *WEB-based user interfaces - Abstract
Wireless sensor networks (WSN) are being increasingly used for data acquisition and control of remote devices. However, they present some constraints in critical and large-scale scenarios. The main limitations come from the nature of their components, such as lossy links, and devices with power supply limitations, poor processing power and limited memory. The main feature of software-defined networks (SDN) is the separation between the control plane and the data plane, making available a logically unified view of the topology in the controllers. In this way, it is possible to build network applications that take into account this unified view, which makes the SDN an alternative approach to solve the mentioned limitations. This paper presents the SD6WSN (software-defined 6LoWPAN wireless sensor network) architecture, developed to control the behavior of the data traffic in 6LoWPAN according to the SDN approach. It takes into account the specific characteristics of WSN devices, such as low data transfer rate, high latency, packet loss and low processing power, and takes advantage of the flexibility provided by flow-based forwarding, allowing the development of specific networking applications based on a unified view. We provide a detailed description of how we have implemented SD6WSN in the Contiki operating system. The new architecture is assessed in two experiments. The first considers a typical advanced metering infrastructure (AMI) network and measures the overhead of SD6WSN control messages in configurations involving different path lengths. The results indicate that the overhead introduced is not excessive, given the advantages that the SDN approach can bring. The second considers a grid-topology to evaluate the average latency of the peer-to-peer communication. It was observed that the average latency in the SD6WSN is considerably lower than that obtained with standard 6LoWPAN, showing the potential of the proposed approach. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.