|
Dissertations |
|
1
|
-
PEDRO HENRIQUE RODRIGUES EMERICK
-
Proposal of an architecture for multilevel (pseudo)anonymization of healthcare data
-
Advisor : ROGER KREUTZ IMMICH
-
COMMITTEE MEMBERS :
-
ROGER KREUTZ IMMICH
-
ITAMIR DE MORAIS BARROCA FILHO
-
SILVIO COSTA SAMPAIO
-
PATRÍCIA RAQUEL VIEIRA SOUSA
-
DIEGO LUIZ KREUTZ
-
Data: Feb 27, 2023
-
-
Show Abstract
-
In recent decades, technological evolution has brought numerous advances allowing intensive collection, processing, and storage of personal data. There is much evidence, mainly revelations, about the operations and data breaches of large companies with data as their most significant asset, such as Facebook, Google, Amazon, and Uber. Due to this finding, there is a growing concern about using these data, evidenced by the profusion of laws worldwide that aim to protect individuals' privacy. The various legislations point to the need to implement processes and techniques that guarantee data privacy, among which is the (pseudo)anonymization of data. It is in this context and seeking to contribute to the protection of privacy that, in this work, an architecture is proposed for the multilevel (pseudo)anonymization of health data. Multilevel, as data is pseudonymized at two levels, one local and one global, thus ensuring that data from multiple providers can be related yet (pseudo)anonymized. The focus on the health area is, on the one hand, a challenging application, given the sensitivity of the data. The architecture proposed in this work was implemented as a proof of concept and evaluated from a set of tests. Test results suggest that the architecture enables correct anonymization at the source, secure linking of (pseudo)anonymized data across multiple sources, and even allows reidentification for cases involving the security of the individuals involved.
|
|
2
|
-
DEGEMAR PEREIRA DA SILVA
-
Authentication Scheme and Key Agreement for Internet of Things Using MQTT Protocol
-
Advisor : ROGER KREUTZ IMMICH
-
COMMITTEE MEMBERS :
-
LOURENCO ALVES PEREIRA JUNIOR
-
GUSTAVO GIRAO BARRETO DA SILVA
-
RAMON DOS REIS FONTES
-
ROGER KREUTZ IMMICH
-
SILVIO COSTA SAMPAIO
-
Data: Feb 28, 2023
-
-
Show Abstract
-
The Internet of Things is passing for a large growth, allowing that more devices be connected in the Internet and so, taking to a increase volume data. This technology pass through several challenges and one of the main is the information security. In IoT environments the security is essential for not permit the entrance of bad intentional devices, offer secure communication and data protection. Exist a lot of factors that are connected to a good security system, for exemple, athentication, criptography, secure communication canal and users identification. This work apresent a authentication scheme for Internet of Things that can be use with MQTT protocol. The propose scheme was developed using a set of tecniques like, logic port XOR, symetric criptography and hash functions. Other than that, is propose the use of PUF tecnique for unique identification of devices in IoT. The algorithm was tested using a tool for formal validation of security protocols, the scyther. In addition, the schema was implemented in a test environment using virtual machines. Therefore the python language was used to develop the schema and the Mosquitto service, with the MQTT protocol. During the performance evaluation, it was evident the existence of a commitment in the computational resources depending on of the provides security, existing a space to improve of the algorithm. On the other hand, the results showed that the schema own the necessary requirements to provide safe authentication and protection to data sended and received by devices.
|
|
3
|
-
LUCAS NOVAIS ASSUNÇÃO
-
Lnowledge loss in software projects due to turnover of IT professionals: A study at the Federal University of Viçosa – UFV
-
Advisor : EIJI ADACHI MEDEIROS BARBOSA
-
COMMITTEE MEMBERS :
-
EIJI ADACHI MEDEIROS BARBOSA
-
FERNANDO MARQUES FIGUEIRA FILHO
-
AWDREN DE LIMA FONTAO
-
Data: Apr 20, 2023
-
-
Show Abstract
-
Knowledge is considered one of the most important strategic assets for contemporary organizations. Prusak (1997) highlights that ‘knowledge and intelligence are connected: intelligence is necessary to generate knowledge and knowledge provides the basis through which intelligence can be applied.’ Intelligence comes from people that, supported by Information Technology (IT), execute, manage, and make the best decisions for good performance of organizations, whether public or private. Research shows that the turnover of IT professionals has become a critical problem and the deficit may reach half a million by 2025, reflecting a significant acceleration of the demand in that sector. Furthermore, 53,000 people graduate every year in Brazil - a third of the projected demand - and almost 50% of those already hired in the last 12 months have had two additional job offers, which are considered and may represent the voluntary departure from the current organization in the short or medium term. The turnover of IT professionals brings several costs, minimizing and containing its damage has become a difficult and recurrent challenge for Human Resources, not only for economic reasons, but especially for the management and preservation of the main immaterial asset directly responsible for the success of any organization: knowledge. This paper will present a study about knowledge loss and retention at Federal University of Viçosa, where the turnover phenomenon for the position of Information Technology Technician in the last two years was considered relevant in order to ensure software development, preserving the institutional memory, and avoiding possible loss of public resources. A handbook for knowledge retention in software projects will be elaborated in this study in order to support managers and team members in implementing such actions in their work routine. The goal is to ensure good work progress, preserve institutional memory and avoid eventual public resource loss.
|
|
4
|
-
WILLIE LAWRENCE DA PAZ SILVA
-
Impact of Database Schema Evolution on Software Availability
-
Advisor : EIJI ADACHI MEDEIROS BARBOSA
-
COMMITTEE MEMBERS :
-
EIJI ADACHI MEDEIROS BARBOSA
-
UIRA KULESZA
-
RODRIGO BONIFACIO DE ALMEIDA
-
Data: Apr 28, 2023
-
-
Show Abstract
-
In the software’s life cycle that uses relational databases to store data, we observed that the natural evolution of the application takes to changes in the database schema, that is the structure that defines how the data is stored. During the execution of operations responsible for changes in the database schema, the database can interrupt the data access until the schema change operation finishes. We call these operations that cause interruptions in data access “blocking operations”. The blocking operations are a problem, particularly in systems that need high availability as monitoring systems, sale systems with high traffic volume, government systems, etc. In this work, we study the database schema evolution of a real-world application to understand the schema change operation’s blocking nature. Moreover, we performed a series of controlled experiments aiming to analyze the impact of schema change operations in the availability of an application being used during the the schema evolution. Finally, our work implements suggestions from industry practitioners to solve the data unavailability problem during the schema evolution. Thus, the same experiment set was repeated in a new scenario where the practitioner’s suggestions were applied. Our results show that the suggestions from practitioners are efficient until a limit, in such a way that databases with a high number of registries can have an evident decrease in the duration of database unavailability, but not enough to the final user.
|
|
5
|
-
ARYCLENIO XAVIER BARROS
-
A Proposal of Bad Smells in React Systems
-
Advisor : EIJI ADACHI MEDEIROS BARBOSA
-
COMMITTEE MEMBERS :
-
EIJI ADACHI MEDEIROS BARBOSA
-
ELDER JOSÉ REIOLI CIRILO
-
LEONARDO DA SILVA SOUSA
-
Data: Jun 23, 2023
-
-
Show Abstract
-
The Javascript language is one of the most famous development tools today, gaining visibility in several areas such as web games, three-dimensional renderings, artificial intelligence and, mainly, the development of web applications, with its major role in the construction of interfaces through front end development. In this ecosystem, several libraries and frameworks were built, the most famous being the React library, developed and published by Meta (Facebook). Applications built on React, like any other system, need to remain usable and relevant over time. As empirical evidence shows, the presence of bad smells in the code might compromise the software evolvability. Based on this context, this work presents, based on mapping studies of the academic and gray literature, a proposal of bad smells oriented to the React library, integrating them to a code detection tool called ReactLint, which will flag code flaws and will indicate possible solutions to developers who use it. This work aims to validate the proposed smells, as well as the built tool, in order to identify whether they can affect the performance of a React application in the short and long term
|
|
6
|
-
IURI JANMICHEL DE SOUSA LIMA
-
Development of a machine learning-based tool for predicting participants in evaluation processes
-
Advisor : ITAMIR DE MORAIS BARROCA FILHO
-
COMMITTEE MEMBERS :
-
DIEGO SILVEIRA COSTA NASCIMENTO
-
ITAMIR DE MORAIS BARROCA FILHO
-
JOAO CARLOS XAVIER JUNIOR
-
Data: Jun 23, 2023
-
-
Show Abstract
-
This work was developed within the Núcleo Permanente de Concursos (Permanent Center of Contests) of UFRN, the Comperve. All the management of the appraisal processes that are organized by this Center derive directly from the number of participants enrolled in its appraisal processes. Based on these assumptions, this work presents a model for the use of machine learning techniques on the logistical organization of the evaluation processes organized by Comperve. The model presented here was created from the data bases available in the Center, which contained information about the evaluation processes carried out by Comperve since the beginning of the 2000s. In order to carry out this work, the execution context of the activities where this Center is currently located was investigated, analyzing how the logistic organization of its processes is done, integrating the data that was decentralized and de-standardized, and creating the training model that achieved more than 98% of accuracy in the classification of the quantity of participants enrolled in its processes. For the application of this model, an application using the infrastructure of the management system of the appraisal processes, which is currently being developed, was developed.
|
|
7
|
-
CEZAR MIRANDA PAULA DE SOUZA
-
A Process for Performance Evaluation and Change Management of Machine Learning Models in Healthcare applications
-
Advisor : ITAMIR DE MORAIS BARROCA FILHO
-
COMMITTEE MEMBERS :
-
ADRIAO DUARTE DORIA NETO
-
ANNA GISELLE CAMARA DANTAS RIBEIRO RODRIGUES
-
CICILIA RAQUEL MAIA LEITE
-
ITAMIR DE MORAIS BARROCA FILHO
-
Data: Jun 26, 2023
-
-
Show Abstract
-
Fostered by hardware and software advances, Machine Learning (ML) started to ramp up exponentially in the last few decades, and has become instrumental for advancing the work in the most varied areas of knowledge. Though generally restricted to controlledspace experiments, over previously obtained and curated data samples, results have been outstanding, which gave rise to such levels of popularity for ML applications that it’s hard to find an area of human knowledge left untouched by Machine Learning. In such context, establishing minimum performance guarantees over unknown, real-world data, becomes paramount, especially in Healthcare applications, where errors can lead to life-threatening situations. There’s an ML discipline, called Machine Learning Operations (or MLOps, for short), which concerns itself with ML Models’ lifecycle management, from conception to deployment in production (real-world) environments, including monitoring its real-world behavior. Once deployed, models are subject to performance decay issues, such as drift, which has motivated recent studies on continual learning and Continuous Monitoring of ML models. The present work focuses on identifying state-of-the-art techniques for evaluating model fitness in real-world usage scenarios, and on how to establish a feedback-loop to include continuous monitoring and change management in the models’ lifecycle. Finally, the present work aims to apply evaluation techniques in a case study of ML models applied to Healthcare, and establish a process for evaluating models. The target models were developed as part of the Remote Assistance Platform (PAR), and is currently in effective use in an oncologic ICU.
|
|
8
|
-
INÁCIA FERNANDES DA COSTA NETA
-
A Study on Energy Consumption in Supercomputers.
-
Advisor : GUSTAVO GIRAO BARRETO DA SILVA
-
COMMITTEE MEMBERS :
-
GUSTAVO GIRAO BARRETO DA SILVA
-
ITAMIR DE MORAIS BARROCA FILHO
-
IVAN SARAIVA SILVA
-
SAMUEL XAVIER DE SOUZA
-
Data: Oct 31, 2023
-
-
Show Abstract
-
The recent technological revolution and the exorbitant increase in data required invest- ments and improvements in the IT area. There are several activities that require increased processing and the indispensability of high availability. One of these activities is research, carried out by academic centers, for example, which lack high-performance equipment for highly complex tasks. Their energy consumption becomes huge and expensive, requiring studies of different strategies in the area. This document presents an initial study for improving server energy management in order to save energy consumption and financial expenses. A supercomputer is appointed as the object of study, from which data on com- putational and energy consumption was collected, generating specific and comparative analyzes between them. Finally, a strategy is suggested to reduce the energy consump- tion of this equipment as a proposal for an opportunity to save energy and consequently financially.
|
|
9
|
-
ALEX AUGUSTO DE SOUZA SANTOS
-
Towards an architecture for supporting computer network configuration based on natural language and device discovery
-
Advisor : ROGER KREUTZ IMMICH
-
COMMITTEE MEMBERS :
-
Bruno Dalmazo
-
ELIZAMA DAS CHAGAS LEMOS
-
RAMON DOS REIS FONTES
-
ROGER KREUTZ IMMICH
-
Data: Nov 24, 2023
-
-
Show Abstract
-
The internet is becoming increasingly accessible and available to a larger number of people. However, internet users nowadays are no longer enthusiasts or academics as they were in its origin; they are ordinary people. Consequently, users who need to manage a local network under their responsibility are not technically skilled individuals with knowledge of computer network Niche language. In the context of a residential local network, the growing presence of devices and the need to control network access demand solutions that are accessible and intuitive for common users who want greater control over their network. However, home router configuration interfaces are currently limited, unintuitive, and unfriendly to the general public. Consequently, they hinder access control and customization of advanced settings as they require specialized technical knowledge. Moreover, the lack of standardization in these interfaces creates accessibility barriers for users. As a result, users face difficulties in effectively configuring their residential routers, limiting their ability to control network access and customize settings. The use of natural language, whether through voice or text, becomes an interface that presents an advantage in this context due to its simplicity and accessibility for this audience. This work addresses this issue and proposes a layered architecture that utilizes natural language and automation resources to facilitate the configuration of residential networks, particularly focusing on device access control and device class control. This approach aims to eliminate the need for specialized technical knowledge from the user. To achieve this goal, this work reviews the state of the art regarding the use of natural language in the context of intent-based network configuration and contributes with a systematic mapping of the use of natural language for network configuration in the domestic context, along with existing strategies for device identification and classification in a network with heterogeneous devices. By using natural language processing tools facilitated by artificial intelligence and features such as automatic device identification and classification, it is expected to offer common users a more intuitive and efficient experience in configuring their residential networks. To validate the proposed solution, a prototype in the Python language will be developed, establishing a hierarchy of device types and a hierarchy of configuration intentions, both compatible with the residential environment. The prototype will utilize communication between APIs and the SSH protocol to provide interoperability between the proposed layers. The research results indicate that the use of natural language for network configuration is still underexplored in the residential context, particularly concerning automatic detection of device types present in the network. At this point, the proposed hierarchies and the necessary descriptors for the prototype's functioning have been established.
|
|
10
|
-
RIVALDO FERNANDES DE ALBUQUERQUE PEREIRA
-
An Anomaly Detection Architecture in SDN using computational intelligence
-
Advisor : ROGER KREUTZ IMMICH
-
COMMITTEE MEMBERS :
-
DOUGLAS D. J. DE MACEDO
-
MARCOS CESAR MADRUGA ALVES PINHEIRO
-
ROGER KREUTZ IMMICH
-
UIRA KULESZA
-
Data: Nov 29, 2023
-
-
Show Abstract
-
Emerging technologies such as the Cloud, 5G, Internet of Things (IoT) and edge computing encompass controlling and networking millions of devices every day. Managing traditional networks with millions of devices is a complex task as it requires configuring data traffic routes on each device in the network. With it centralized network controller, Software-Defined Networking (SDN) can help simplify the configuration and management of a network with this many devices. Many studies have researched the use of different computational intelligence (CI) methods to detect anomalies in SDN, this work defines a framework to validate, promote and explain, using Explainable AI, any of these CI methods that best detects each of the different types of anomalies, and also define architecture based on hexagonal microservices and with a unique data model based on the application and information framework, Open Digital Architecture, from the TM Forum
|
|
11
|
-
YVES DANTAS NEVES
-
Clustering Techniques Applied to Profile Creation on 5G Radio Access Networks Datasets
-
Advisor : JOAO CARLOS XAVIER JUNIOR
-
COMMITTEE MEMBERS :
-
ANNE MAGALY DE PAULA CANUTO
-
ARAKEN DE MEDEIROS SANTOS
-
DANIEL SABINO AMORIM DE ARAUJO
-
JOAO CARLOS XAVIER JUNIOR
-
Data: Dec 8, 2023
-
-
Show Abstract
-
The Internet arising and the Information and Communication Technologies development expanded the volume and diversification of data sources, thus opening up new opportunities in the industry and academic fields for Machine Learning Techiniques and Big Data related applications. In the same perspective is the extensive amount of data generated by mobile networks infrastructures worldwide. The Radio Access Networks (RAN), crucial for the telecommunications infrastructure, work as a really important layer for the wireless communications and produce a significant data volume due to the network counters measurements which stand as the enablers for the monitoring and visibility on network performance indicators and service quality. The present work consists of applying clustering algorithms to create profiles on datasets related to 5G Radio Access Network Indicators regarding traffic, volume and channel quality so the labeled data can get used on classification problems and as a support tool for identifying improvements, performance management and operational efficiency of Radio Access Networks.
|
|
12
|
-
ORMAZABAL LIMA DO NASCIMENTO
-
Comparative study between transformers models applied to the development of chatbots
-
Advisor : DANIEL SABINO AMORIM DE ARAUJO
-
COMMITTEE MEMBERS :
-
DANIEL SABINO AMORIM DE ARAUJO
-
JOAO CARLOS XAVIER JUNIOR
-
THAIS GAUDENCIO DO REGO
-
Data: Dec 15, 2023
-
-
Show Abstract
-
Models based on trasformer architecture have shown promising results in areas of study such as natural language processing (NLP). In this same area of study, chatbots are tools widely used in customer service tasks. This work will use RASA and its DIET classifier to perform a comparative study of the impact of pre-trained trasformer models in the development of a chatbot. As a scenario for this study, the case of the Court of Auditors of Rio Grande do Norte (TCE/RN) and its need to implement a chatbot aimed at improving the efficiency of its public service sector was analyzed.
|
|
13
|
-
IURI CABRAL PAIVA
-
Exploring loan patterns: a predictive perspective in the Zila Mamede university library
-
Advisor : DANIEL SABINO AMORIM DE ARAUJO
-
COMMITTEE MEMBERS :
-
ARAKEN DE MEDEIROS SANTOS
-
DANIEL SABINO AMORIM DE ARAUJO
-
ISMENIA BLAVATSKY DE MAGALHÃES
-
JOAO CARLOS XAVIER JUNIOR
-
Data: Dec 22, 2023
-
-
Show Abstract
-
The university library has become a longstanding institution within universities, playing a crucial role in supporting the teaching-learning process, research, and university extension. One of its most significant aspects is the loan of informational materials, especially books, to its users. Understanding the profile of users who make these loans and contextualizing their needs is essential for effective planning and optimized resource management within the library. In this context, this study aims to investigate the dynamics of book loans in the circulating collection of the Zila Mamede Central Library (BCZM), with the goal of anticipating user demands through the analysis of historical loan data. Initially, Exploratory Data Analysis was employed to understand relevant aspects of the interaction between students and the library, using loan data and information associated with students' academic lives. Clustering, performed through KNN and Hierarchical Clustering algorithms, allowed the identification of distinct student profiles, enriching the understanding of the specific needs of each group. Finally, to fully achieve the proposed objective, the Random Forest and SARIMA models were used to predict loans for the year 2019, using data grouped on a weekly and monthly basis. The results indicate that students who use loan services tend to have a higher academic completion rate and a lower incidence of withdrawals and cancellations. Regarding prediction models, both SARIMA and Random Forest proved promising in identifying trends in loans, highlighting their applicability to the Zila Mamede Central Library. This study not only contributes to a deeper understanding of the dynamics of book loans but also provides valuable insights for the library to proactively anticipate user needs, thereby improving the effectiveness of its operations.
|
|