This is the register of computer program provided by INPI (Instituto Nacional da Propriedade Industrial – National Institute of Industrial Property) Ethermonitor, wich I developed at CPQD when I was an intern.
read moreExperienced software developer specializing in C/C++, embedded systems, and desktop applications. Master's degree holder and researcher with a focus on network technologies. Enthusiast Deep Learning and Game Modding.
This is the register of computer program provided by INPI (Instituto Nacional da Propriedade Industrial – National Institute of Industrial Property) Ethermonitor, wich I developed at CPQD when I was an intern.
read moreEtherMonitor is an application developed in C and implemented for an LTE radio base station, called eNodeB developed in the CPQD Foundation’s LTE/4G project. eNodeB is the radio base station responsible for data transmission using LTE technology, used by internet providers to offer 4G services. Physically, the eNodeB has several ethernet network cables responsible for connecting it to the cloud. In the implementation developed by CPQD, at any given time, only one of them will be operational, and the other backup cables. If any of its interfaces fail, EtherMonitor is responsible for disabling this interface, and reconfiguring the next backup…
read moreIn the mythical continent of Adria, a fantastic and magical land there is a permanent conflict between all the human and beast races that inhabit that land. You will have the mission to lead the Nords, a human race that lives in the snowy mountains and pine forests of the north through a journey to conquer the world. You will travel through deserts, forests, mountains, volcanos, and forests, full of secrets, animals, and mythical creatures. About this Mod Main Campaign This mod brings a new Campaign with RPG-like lore and a collection of new random maps for Age of Mythology….
read moreAbstract: A well-known problem of network traffic representation over time is that there is no “one-fits-all” model. The selection of the “best” model is traditionally made in a time-consuming and ad-hoc manner by human experts. In this letter, we evaluate the feasibility of using Bayesian information criterion (BIC) and Akaike information criterion (AIC) as tools for automated selection of the best-fit stochastic process for inter-packet times. We propose and validate a methodology based on information criteria, resulting in an automated and accurate approach for such traffic modelling tasks. Published in: IEEE Networking Letters ( Volume: 1, Issue: 2, June 2019)…
read moreAbstract: In this work, we aim to evaluate how good are the information criteria AIC and BIC inferring which is the best stochastic process to describe Ethernet inter-packet times. Also, we check if there is a practical difference between using AIC or BIC. We use a set of stochastic distributions to represent inter-packet of a traffic trace and calculate AIC and BIC. To test the quality of BIC and AIC guesses, we define a cost function based on the comparison of significant stochastic properties for internet traffic modeling, such as correlation, fractal-level and mean. Then, we compare both results. In…
read moreAbstract: New emerging technologies have a larger unpredictability, compared to legacy equipment. They require a larger set of meaningful tests on many different scenarios. But, in the open source world is hard to find a single tool able to provide realism, speed, easy usage and flexibility at the same time. Most of the tools are monolithic and devoted to specific purposes. This work presents a flexible and extensible framework which aims to decouple synthetic traffic modelling from its traffic generator engine. Through a new abstraction layer, it would become possible to use modern and throughput optimized tools to create realistic…
read moreRevisão envolvendo a viabilidade da utilização de NFV em conjunto com SDN sobre servidores ARM de nova geração Abstract: This work reviews the feasibility of using NFV (Network Function Virtualization) and SDN (Software Defined Networks) technologies together on an ARM hardware platform. A theoretical introduction is made on the subject, a brief exposition of the architecture of NFV and SDN technologies, as well as a study of motivations, requirements and challenges, with a main focus on NFV. SDN here is mainly seen as a possibility that the use of these technologies together can more easily lead to the fulfillment of…
read moreAbstract: A well-known problem of network traffic representation over time is that there is no “one-fits-all” model. The selection of the “best” model is traditionally made in a time-consuming and ad-hoc manner by human experts. In this letter, we evaluate the feasibility of using Bayesian information criterion (BIC) and Akaike information criterion (AIC) as tools for automated selection of the best-fit stochastic process for inter-packet times. We propose and validate a methodology based on information criteria, resulting in an automated and accurate approach for such traffic modelling tasks. Published in: IEEE Networking Letters ( Volume: 1, Issue: 2, June 2019)…
read moreAbstract: In this work, we aim to evaluate how good are the information criteria AIC and BIC inferring which is the best stochastic process to describe Ethernet inter-packet times. Also, we check if there is a practical difference between using AIC or BIC. We use a set of stochastic distributions to represent inter-packet of a traffic trace and calculate AIC and BIC. To test the quality of BIC and AIC guesses, we define a cost function based on the comparison of significant stochastic properties for internet traffic modeling, such as correlation, fractal-level and mean. Then, we compare both results. In…
read moreAbstract: New emerging technologies have a larger unpredictability, compared to legacy equipment. They require a larger set of meaningful tests on many different scenarios. But, in the open source world is hard to find a single tool able to provide realism, speed, easy usage and flexibility at the same time. Most of the tools are monolithic and devoted to specific purposes. This work presents a flexible and extensible framework which aims to decouple synthetic traffic modelling from its traffic generator engine. Through a new abstraction layer, it would become possible to use modern and throughput optimized tools to create realistic…
read moreCidades Inteligentes & Big Data Tecnologias de Big Data como habilitadoras das Cidades do Futuro - Uma abordagem top-down Abstract: This work aims to discuss the themes of smart cities and big data, inserted within the same context, and to show the numerous points at which they interrelate. It is discussed how big data technologies are a fundamental enabler so that smart cities can actually be implemented. Both concepts are formally introduced, with the concept of smart cities discussed being inserted within the architecture and technological map of the big data value chain. Finally, a practical example of implementing a…
read moreTecnologias SDN e NFV; e SDN como habilitadora de NFV Abstract: In recent years, the expansion of internet access has led to a true revolution in telecommunications. However, the very nature of the architecture of the internet has shown itself to be a bottleneck that prevents innovations in the medium. Thus, increases in operating capital expenditures, as well as increased network complexity are inevitable. In order to solve part of these problems, new technologies, SDN and NFV, appear. Although both are conceptually independent of each other, the set of common goals, as well as the possibility of adopting both together,…
read moreIntrodução aos protocolos CL-AKA Abstract: The use of digital certificates distributed by a Public Key Infrastructure (PKI) is the most widespread methodology in symmetric key agreement protocols. In this work, some alternative methodologies will be discussed, with a greater focus on CL-AKA protocols, ie, authenticated key agreement protocols without the use of certificates. The theoretical foundations, two protocol implementations, and some practical applications and proposals will be discussed. Resumo: A utilização de certificados digitais distribuídos por uma Infraestrutura de chaves públicas (PKI) é a metodologia mais difundida em protocolos de acordo de chave simétrica. Neste trabalho serão discutidas algumas metodologias…
read moreIntrodução aos protocolos CL-AKA Abstract: The use of digital certificates distributed by a Public Key Infrastructure (PKI) is the most widespread methodology in symmetric key agreement protocols. In this work, some alternative methodologies will be discussed, with a greater focus on CL-AKA protocols, ie, authenticated key agreement protocols without the use of certificates. The theoretical foundations, two protocol implementations, and some practical applications and proposals will be discussed. Resumo: A utilização de certificados digitais distribuídos por uma Infraestrutura de chaves públicas (PKI) é a metodologia mais difundida em protocolos de acordo de chave simétrica. Neste trabalho serão discutidas algumas metodologias…
read moreSpear: Mod Organizer for Git Versioning
MoForGit is a tool that allows you create a Git repository using a Mod Organizer Tools.
Allows you to manage different installations of Steam Game in the same Hard Disk;
Transform the installation folder into a git repository, and gitignore all the game files – do file versioning of only your mod files.
Abstract: Real network traffic has a different impact over network nodes if compared to constant traffic generated by tools like Iperf, even when they have the same average throughput. Busty traffic may cause buffers overflows while constant traffic does not, and can decrease the measurement accuracy. The number of flows may have an impact on flow-oriented nodes, such as SDN switches and controllers. In a scenario where software-defined networks will play an essential role in the future internet, a more in-depth validation of new technologies considering these aspects is crucial. Also, most of the open-source realistic traffic generator tools have…
read moreCidades Inteligentes & Big Data Tecnologias de Big Data como habilitadoras das Cidades do Futuro - Uma abordagem top-down Abstract: This work aims to discuss the themes of smart cities and big data, inserted within the same context, and to show the numerous points at which they interrelate. It is discussed how big data technologies are a fundamental enabler so that smart cities can actually be implemented. Both concepts are formally introduced, with the concept of smart cities discussed being inserted within the architecture and technological map of the big data value chain. Finally, a practical example of implementing a…
read moreQuest Dialog Manager
CK QuestDialogManages is a tool to help manage your quest mod:
Allows the conversion and generation of many audio files formats (wav, xwm, fuz) Allow you easily manage the audios from you mod: listen to audios, manage file names,and check subtitles; Generate beautifull and comprehensive documentation; Reusable Comments and anotations for your documentation. Regenerate as many times you want with no loss.
read moreSpear: Mod Organizer for Git Versioning
MoForGit is a tool that allows you create a Git repository using a Mod Organizer Tools.
Allows you to manage different installations of Steam Game in the same Hard Disk;
Transform the installation folder into a git repository, and gitignore all the game files – do file versioning of only your mod files.
Just a simple command line app to convert Markdown files into different formats. HTML DOCX PDF TXT If you type mdconv.exe –help you can read its usage manual: NAME MdConv.exe - an app to convert md files into different formats. USAGE mdconv.exe –md <markdown-file> –title <html-title> mdconv.exe –md <markdown-file> –title <html-title> –output <output-format> mdconv.exe –help mdconv.exe –version mdconv.exe –license OPTIONS -m <md-file>, –md=<md-file> Path to the Markdonw file to be converted into the specified format. Default format is HTML. -t <title>, –title=<html-title> Option required for HTML format. Represents the title of the page. -o <output-file-format>, –output=<output-file-format> Output file format. If…
read moreThis is the register of computer program provided by INPI (Instituto Nacional da Propriedade Industrial – National Institute of Industrial Property) Ethermonitor, wich I developed at CPQD when I was an intern.
read moreEtherMonitor is an application developed in C and implemented for an LTE radio base station, called eNodeB developed in the CPQD Foundation’s LTE/4G project. eNodeB is the radio base station responsible for data transmission using LTE technology, used by internet providers to offer 4G services. Physically, the eNodeB has several ethernet network cables responsible for connecting it to the cloud. In the implementation developed by CPQD, at any given time, only one of them will be operational, and the other backup cables. If any of its interfaces fail, EtherMonitor is responsible for disabling this interface, and reconfiguring the next backup…
read moreAbstract: Real network traffic has a different impact over network nodes if compared to constant traffic generated by tools like Iperf, even when they have the same average throughput. Busty traffic may cause buffers overflows while constant traffic does not, and can decrease the measurement accuracy. The number of flows may have an impact on flow-oriented nodes, such as SDN switches and controllers. In a scenario where software-defined networks will play an essential role in the future internet, a more in-depth validation of new technologies considering these aspects is crucial. Also, most of the open-source realistic traffic generator tools have…
read moreAbstract: A well-known problem of network traffic representation over time is that there is no “one-fits-all” model. The selection of the “best” model is traditionally made in a time-consuming and ad-hoc manner by human experts. In this letter, we evaluate the feasibility of using Bayesian information criterion (BIC) and Akaike information criterion (AIC) as tools for automated selection of the best-fit stochastic process for inter-packet times. We propose and validate a methodology based on information criteria, resulting in an automated and accurate approach for such traffic modelling tasks. Published in: IEEE Networking Letters ( Volume: 1, Issue: 2, June 2019)…
read moreIn the mythical continent of Adria, a fantastic and magical land there is a permanent conflict between all the human and beast races that inhabit that land. You will have the mission to lead the Nords, a human race that lives in the snowy mountains and pine forests of the north through a journey to conquer the world. You will travel through deserts, forests, mountains, volcanos, and forests, full of secrets, animals, and mythical creatures. About this Mod Main Campaign This mod brings a new Campaign with RPG-like lore and a collection of new random maps for Age of Mythology….
read moreFor centuries the Daedric Wolves lived among the sons of Skyrim in secret. But no one wanted to believe. Or had the strength to fight. Now it is up to YOU to choose which side will prevail. The Beast Blood… Or the Silver Hands! Overview This mod allow you to join the Silver Hand faction! It is up to you to decide! You can still follow the vanilla path joining The Companions, but this mod allow you to see an alternate timeline where the Dragonborn joins the Silver Hand instead! I am really grateful for all the positive comments and…
read moreRevisão envolvendo a viabilidade da utilização de NFV em conjunto com SDN sobre servidores ARM de nova geração Abstract: This work reviews the feasibility of using NFV (Network Function Virtualization) and SDN (Software Defined Networks) technologies together on an ARM hardware platform. A theoretical introduction is made on the subject, a brief exposition of the architecture of NFV and SDN technologies, as well as a study of motivations, requirements and challenges, with a main focus on NFV. SDN here is mainly seen as a possibility that the use of these technologies together can more easily lead to the fulfillment of…
read moreJust a simple command line app to convert Markdown files into different formats. HTML DOCX PDF TXT If you type mdconv.exe –help you can read its usage manual: NAME MdConv.exe - an app to convert md files into different formats. USAGE mdconv.exe –md <markdown-file> –title <html-title> mdconv.exe –md <markdown-file> –title <html-title> –output <output-format> mdconv.exe –help mdconv.exe –version mdconv.exe –license OPTIONS -m <md-file>, –md=<md-file> Path to the Markdonw file to be converted into the specified format. Default format is HTML. -t <title>, –title=<html-title> Option required for HTML format. Represents the title of the page. -o <output-file-format>, –output=<output-file-format> Output file format. If…
read moreAbstract: A well-known problem of network traffic representation over time is that there is no “one-fits-all” model. The selection of the “best” model is traditionally made in a time-consuming and ad-hoc manner by human experts. In this letter, we evaluate the feasibility of using Bayesian information criterion (BIC) and Akaike information criterion (AIC) as tools for automated selection of the best-fit stochastic process for inter-packet times. We propose and validate a methodology based on information criteria, resulting in an automated and accurate approach for such traffic modelling tasks. Published in: IEEE Networking Letters ( Volume: 1, Issue: 2, June 2019)…
read moreAbstract: In this work, we aim to evaluate how good are the information criteria AIC and BIC inferring which is the best stochastic process to describe Ethernet inter-packet times. Also, we check if there is a practical difference between using AIC or BIC. We use a set of stochastic distributions to represent inter-packet of a traffic trace and calculate AIC and BIC. To test the quality of BIC and AIC guesses, we define a cost function based on the comparison of significant stochastic properties for internet traffic modeling, such as correlation, fractal-level and mean. Then, we compare both results. In…
read moreAbstract: Real network traffic has a different impact over network nodes if compared to constant traffic generated by tools like Iperf, even when they have the same average throughput. Busty traffic may cause buffers overflows while constant traffic does not, and can decrease the measurement accuracy. The number of flows may have an impact on flow-oriented nodes, such as SDN switches and controllers. In a scenario where software-defined networks will play an essential role in the future internet, a more in-depth validation of new technologies considering these aspects is crucial. Also, most of the open-source realistic traffic generator tools have…
read moreAbstract: Real network traffic has a different impact over network nodes if compared to constant traffic generated by tools like Iperf, even when they have the same average throughput. Busty traffic may cause buffers overflows while constant traffic does not, and can decrease the measurement accuracy. The number of flows may have an impact on flow-oriented nodes, such as SDN switches and controllers. In a scenario where software-defined networks will play an essential role in the future internet, a more in-depth validation of new technologies considering these aspects is crucial. Also, most of the open-source realistic traffic generator tools have…
read moreThis is the register of computer program provided by INPI (Instituto Nacional da Propriedade Industrial – National Institute of Industrial Property) Ethermonitor, wich I developed at CPQD when I was an intern.
read moreEtherMonitor is an application developed in C and implemented for an LTE radio base station, called eNodeB developed in the CPQD Foundation’s LTE/4G project. eNodeB is the radio base station responsible for data transmission using LTE technology, used by internet providers to offer 4G services. Physically, the eNodeB has several ethernet network cables responsible for connecting it to the cloud. In the implementation developed by CPQD, at any given time, only one of them will be operational, and the other backup cables. If any of its interfaces fail, EtherMonitor is responsible for disabling this interface, and reconfiguring the next backup…
read moreCidades Inteligentes & Big Data Tecnologias de Big Data como habilitadoras das Cidades do Futuro - Uma abordagem top-down Abstract: This work aims to discuss the themes of smart cities and big data, inserted within the same context, and to show the numerous points at which they interrelate. It is discussed how big data technologies are a fundamental enabler so that smart cities can actually be implemented. Both concepts are formally introduced, with the concept of smart cities discussed being inserted within the architecture and technological map of the big data value chain. Finally, a practical example of implementing a…
read moreJust a simple command line app to convert Markdown files into different formats. HTML DOCX PDF TXT If you type mdconv.exe –help you can read its usage manual: NAME MdConv.exe - an app to convert md files into different formats. USAGE mdconv.exe –md <markdown-file> –title <html-title> mdconv.exe –md <markdown-file> –title <html-title> –output <output-format> mdconv.exe –help mdconv.exe –version mdconv.exe –license OPTIONS -m <md-file>, –md=<md-file> Path to the Markdonw file to be converted into the specified format. Default format is HTML. -t <title>, –title=<html-title> Option required for HTML format. Represents the title of the page. -o <output-file-format>, –output=<output-file-format> Output file format. If…
read moreTecnologias SDN e NFV; e SDN como habilitadora de NFV Abstract: In recent years, the expansion of internet access has led to a true revolution in telecommunications. However, the very nature of the architecture of the internet has shown itself to be a bottleneck that prevents innovations in the medium. Thus, increases in operating capital expenditures, as well as increased network complexity are inevitable. In order to solve part of these problems, new technologies, SDN and NFV, appear. Although both are conceptually independent of each other, the set of common goals, as well as the possibility of adopting both together,…
read moreNexus Build App
Nexus Packager App is a command-line tool for automating the packaging process of Nexus mods.
I create this app because I wanted a flexible and simple tool to package both my Skyrim and Age of Mythology mods.
This application:
Package files defined by rules into a ZIP, and preserve its original directory structure; Scriptable rules, write once, so you will never forget any files; Creates an uninstall script.
read moreIn the mythical continent of Adria, a fantastic and magical land there is a permanent conflict between all the human and beast races that inhabit that land. You will have the mission to lead the Nords, a human race that lives in the snowy mountains and pine forests of the north through a journey to conquer the world. You will travel through deserts, forests, mountains, volcanos, and forests, full of secrets, animals, and mythical creatures. About this Mod Main Campaign This mod brings a new Campaign with RPG-like lore and a collection of new random maps for Age of Mythology….
read moreFor centuries the Daedric Wolves lived among the sons of Skyrim in secret. But no one wanted to believe. Or had the strength to fight. Now it is up to YOU to choose which side will prevail. The Beast Blood… Or the Silver Hands! Overview This mod allow you to join the Silver Hand faction! It is up to you to decide! You can still follow the vanilla path joining The Companions, but this mod allow you to see an alternate timeline where the Dragonborn joins the Silver Hand instead! I am really grateful for all the positive comments and…
read moreQuest Dialog Manager
CK QuestDialogManages is a tool to help manage your quest mod:
Allows the conversion and generation of many audio files formats (wav, xwm, fuz) Allow you easily manage the audios from you mod: listen to audios, manage file names,and check subtitles; Generate beautifull and comprehensive documentation; Reusable Comments and anotations for your documentation. Regenerate as many times you want with no loss.
read moreSpear: Mod Organizer for Git Versioning
MoForGit is a tool that allows you create a Git repository using a Mod Organizer Tools.
Allows you to manage different installations of Steam Game in the same Hard Disk;
Transform the installation folder into a git repository, and gitignore all the game files – do file versioning of only your mod files.
This is the register of computer program provided by INPI (Instituto Nacional da Propriedade Industrial – National Institute of Industrial Property) Ethermonitor, wich I developed at CPQD when I was an intern.
read moreEtherMonitor is an application developed in C and implemented for an LTE radio base station, called eNodeB developed in the CPQD Foundation’s LTE/4G project. eNodeB is the radio base station responsible for data transmission using LTE technology, used by internet providers to offer 4G services. Physically, the eNodeB has several ethernet network cables responsible for connecting it to the cloud. In the implementation developed by CPQD, at any given time, only one of them will be operational, and the other backup cables. If any of its interfaces fail, EtherMonitor is responsible for disabling this interface, and reconfiguring the next backup…
read moreNexus Build App
Nexus Packager App is a command-line tool for automating the packaging process of Nexus mods.
I create this app because I wanted a flexible and simple tool to package both my Skyrim and Age of Mythology mods.
This application:
Package files defined by rules into a ZIP, and preserve its original directory structure; Scriptable rules, write once, so you will never forget any files; Creates an uninstall script.
read moreIn the mythical continent of Adria, a fantastic and magical land there is a permanent conflict between all the human and beast races that inhabit that land. You will have the mission to lead the Nords, a human race that lives in the snowy mountains and pine forests of the north through a journey to conquer the world. You will travel through deserts, forests, mountains, volcanos, and forests, full of secrets, animals, and mythical creatures. About this Mod Main Campaign This mod brings a new Campaign with RPG-like lore and a collection of new random maps for Age of Mythology….
read moreFor centuries the Daedric Wolves lived among the sons of Skyrim in secret. But no one wanted to believe. Or had the strength to fight. Now it is up to YOU to choose which side will prevail. The Beast Blood… Or the Silver Hands! Overview This mod allow you to join the Silver Hand faction! It is up to you to decide! You can still follow the vanilla path joining The Companions, but this mod allow you to see an alternate timeline where the Dragonborn joins the Silver Hand instead! I am really grateful for all the positive comments and…
read moreTecnologias SDN e NFV; e SDN como habilitadora de NFV Abstract: In recent years, the expansion of internet access has led to a true revolution in telecommunications. However, the very nature of the architecture of the internet has shown itself to be a bottleneck that prevents innovations in the medium. Thus, increases in operating capital expenditures, as well as increased network complexity are inevitable. In order to solve part of these problems, new technologies, SDN and NFV, appear. Although both are conceptually independent of each other, the set of common goals, as well as the possibility of adopting both together,…
read moreRevisão envolvendo a viabilidade da utilização de NFV em conjunto com SDN sobre servidores ARM de nova geração Abstract: This work reviews the feasibility of using NFV (Network Function Virtualization) and SDN (Software Defined Networks) technologies together on an ARM hardware platform. A theoretical introduction is made on the subject, a brief exposition of the architecture of NFV and SDN technologies, as well as a study of motivations, requirements and challenges, with a main focus on NFV. SDN here is mainly seen as a possibility that the use of these technologies together can more easily lead to the fulfillment of…
read moreThis is a contrubution I made in 2016 for the testing and validation related with a MininetWifi publication.
It is a simulation of File tranference implemented using the NS-3 Framework. The source code can be found here.
About: Simulate the tranference of a file of 62.6 Mbytes trough two wifi stations.
Topology: Wifi 10.1.1.0
* <-2.72m-> * <-4.08m-> *
n0 AP n1 (source) (client)
This is a contrubution I made in 2016 for the testing and validation related with a MininetWifi publication.
It is a simulation of File tranference implemented using the NS-3 Framework. The source code can be found here.
About: Simulate the tranference of a file of 62.6 Mbytes trough two wifi stations.
Topology: Wifi 10.1.1.0
* <-2.72m-> * <-4.08m-> *
n0 AP n1 (source) (client)
Tecnologias SDN e NFV; e SDN como habilitadora de NFV Abstract: In recent years, the expansion of internet access has led to a true revolution in telecommunications. However, the very nature of the architecture of the internet has shown itself to be a bottleneck that prevents innovations in the medium. Thus, increases in operating capital expenditures, as well as increased network complexity are inevitable. In order to solve part of these problems, new technologies, SDN and NFV, appear. Although both are conceptually independent of each other, the set of common goals, as well as the possibility of adopting both together,…
read moreTecnologias SDN e NFV; e SDN como habilitadora de NFV Abstract: In recent years, the expansion of internet access has led to a true revolution in telecommunications. However, the very nature of the architecture of the internet has shown itself to be a bottleneck that prevents innovations in the medium. Thus, increases in operating capital expenditures, as well as increased network complexity are inevitable. In order to solve part of these problems, new technologies, SDN and NFV, appear. Although both are conceptually independent of each other, the set of common goals, as well as the possibility of adopting both together,…
read moreTecnologias SDN e NFV; e SDN como habilitadora de NFV Abstract: In recent years, the expansion of internet access has led to a true revolution in telecommunications. However, the very nature of the architecture of the internet has shown itself to be a bottleneck that prevents innovations in the medium. Thus, increases in operating capital expenditures, as well as increased network complexity are inevitable. In order to solve part of these problems, new technologies, SDN and NFV, appear. Although both are conceptually independent of each other, the set of common goals, as well as the possibility of adopting both together,…
read moreFor centuries the Daedric Wolves lived among the sons of Skyrim in secret. But no one wanted to believe. Or had the strength to fight. Now it is up to YOU to choose which side will prevail. The Beast Blood… Or the Silver Hands! Overview This mod allow you to join the Silver Hand faction! It is up to you to decide! You can still follow the vanilla path joining The Companions, but this mod allow you to see an alternate timeline where the Dragonborn joins the Silver Hand instead! I am really grateful for all the positive comments and…
read moreJust a simple command line app to convert Markdown files into different formats. HTML DOCX PDF TXT If you type mdconv.exe –help you can read its usage manual: NAME MdConv.exe - an app to convert md files into different formats. USAGE mdconv.exe –md <markdown-file> –title <html-title> mdconv.exe –md <markdown-file> –title <html-title> –output <output-format> mdconv.exe –help mdconv.exe –version mdconv.exe –license OPTIONS -m <md-file>, –md=<md-file> Path to the Markdonw file to be converted into the specified format. Default format is HTML. -t <title>, –title=<html-title> Option required for HTML format. Represents the title of the page. -o <output-file-format>, –output=<output-file-format> Output file format. If…
read moreIntrodução aos protocolos CL-AKA Abstract: The use of digital certificates distributed by a Public Key Infrastructure (PKI) is the most widespread methodology in symmetric key agreement protocols. In this work, some alternative methodologies will be discussed, with a greater focus on CL-AKA protocols, ie, authenticated key agreement protocols without the use of certificates. The theoretical foundations, two protocol implementations, and some practical applications and proposals will be discussed. Resumo: A utilização de certificados digitais distribuídos por uma Infraestrutura de chaves públicas (PKI) é a metodologia mais difundida em protocolos de acordo de chave simétrica. Neste trabalho serão discutidas algumas metodologias…
read moreNexus Build App
Nexus Packager App is a command-line tool for automating the packaging process of Nexus mods.
I create this app because I wanted a flexible and simple tool to package both my Skyrim and Age of Mythology mods.
This application:
Package files defined by rules into a ZIP, and preserve its original directory structure; Scriptable rules, write once, so you will never forget any files; Creates an uninstall script.
read moreJust a simple command line app to convert Markdown files into different formats. HTML DOCX PDF TXT If you type mdconv.exe –help you can read its usage manual: NAME MdConv.exe - an app to convert md files into different formats. USAGE mdconv.exe –md <markdown-file> –title <html-title> mdconv.exe –md <markdown-file> –title <html-title> –output <output-format> mdconv.exe –help mdconv.exe –version mdconv.exe –license OPTIONS -m <md-file>, –md=<md-file> Path to the Markdonw file to be converted into the specified format. Default format is HTML. -t <title>, –title=<html-title> Option required for HTML format. Represents the title of the page. -o <output-file-format>, –output=<output-file-format> Output file format. If…
read moreQuest Dialog Manager
CK QuestDialogManages is a tool to help manage your quest mod:
Allows the conversion and generation of many audio files formats (wav, xwm, fuz) Allow you easily manage the audios from you mod: listen to audios, manage file names,and check subtitles; Generate beautifull and comprehensive documentation; Reusable Comments and anotations for your documentation. Regenerate as many times you want with no loss.
read moreRevisão envolvendo a viabilidade da utilização de NFV em conjunto com SDN sobre servidores ARM de nova geração Abstract: This work reviews the feasibility of using NFV (Network Function Virtualization) and SDN (Software Defined Networks) technologies together on an ARM hardware platform. A theoretical introduction is made on the subject, a brief exposition of the architecture of NFV and SDN technologies, as well as a study of motivations, requirements and challenges, with a main focus on NFV. SDN here is mainly seen as a possibility that the use of these technologies together can more easily lead to the fulfillment of…
read moreThis is a contrubution I made in 2016 for the testing and validation related with a MininetWifi publication.
It is a simulation of File tranference implemented using the NS-3 Framework. The source code can be found here.
About: Simulate the tranference of a file of 62.6 Mbytes trough two wifi stations.
Topology: Wifi 10.1.1.0
* <-2.72m-> * <-4.08m-> *
n0 AP n1 (source) (client)
Tecnologias SDN e NFV; e SDN como habilitadora de NFV Abstract: In recent years, the expansion of internet access has led to a true revolution in telecommunications. However, the very nature of the architecture of the internet has shown itself to be a bottleneck that prevents innovations in the medium. Thus, increases in operating capital expenditures, as well as increased network complexity are inevitable. In order to solve part of these problems, new technologies, SDN and NFV, appear. Although both are conceptually independent of each other, the set of common goals, as well as the possibility of adopting both together,…
read moreRevisão envolvendo a viabilidade da utilização de NFV em conjunto com SDN sobre servidores ARM de nova geração Abstract: This work reviews the feasibility of using NFV (Network Function Virtualization) and SDN (Software Defined Networks) technologies together on an ARM hardware platform. A theoretical introduction is made on the subject, a brief exposition of the architecture of NFV and SDN technologies, as well as a study of motivations, requirements and challenges, with a main focus on NFV. SDN here is mainly seen as a possibility that the use of these technologies together can more easily lead to the fulfillment of…
read moreFor centuries the Daedric Wolves lived among the sons of Skyrim in secret. But no one wanted to believe. Or had the strength to fight. Now it is up to YOU to choose which side will prevail. The Beast Blood… Or the Silver Hands! Overview This mod allow you to join the Silver Hand faction! It is up to you to decide! You can still follow the vanilla path joining The Companions, but this mod allow you to see an alternate timeline where the Dragonborn joins the Silver Hand instead! I am really grateful for all the positive comments and…
read moreQuest Dialog Manager
CK QuestDialogManages is a tool to help manage your quest mod:
Allows the conversion and generation of many audio files formats (wav, xwm, fuz) Allow you easily manage the audios from you mod: listen to audios, manage file names,and check subtitles; Generate beautifull and comprehensive documentation; Reusable Comments and anotations for your documentation. Regenerate as many times you want with no loss.
read moreSpear: Mod Organizer for Git Versioning
MoForGit is a tool that allows you create a Git repository using a Mod Organizer Tools.
Allows you to manage different installations of Steam Game in the same Hard Disk;
Transform the installation folder into a git repository, and gitignore all the game files – do file versioning of only your mod files.
Cidades Inteligentes & Big Data Tecnologias de Big Data como habilitadoras das Cidades do Futuro - Uma abordagem top-down Abstract: This work aims to discuss the themes of smart cities and big data, inserted within the same context, and to show the numerous points at which they interrelate. It is discussed how big data technologies are a fundamental enabler so that smart cities can actually be implemented. Both concepts are formally introduced, with the concept of smart cities discussed being inserted within the architecture and technological map of the big data value chain. Finally, a practical example of implementing a…
read moreAbstract: Real network traffic has a different impact over network nodes if compared to constant traffic generated by tools like Iperf, even when they have the same average throughput. Busty traffic may cause buffers overflows while constant traffic does not, and can decrease the measurement accuracy. The number of flows may have an impact on flow-oriented nodes, such as SDN switches and controllers. In a scenario where software-defined networks will play an essential role in the future internet, a more in-depth validation of new technologies considering these aspects is crucial. Also, most of the open-source realistic traffic generator tools have…
read moreAbstract: A well-known problem of network traffic representation over time is that there is no “one-fits-all” model. The selection of the “best” model is traditionally made in a time-consuming and ad-hoc manner by human experts. In this letter, we evaluate the feasibility of using Bayesian information criterion (BIC) and Akaike information criterion (AIC) as tools for automated selection of the best-fit stochastic process for inter-packet times. We propose and validate a methodology based on information criteria, resulting in an automated and accurate approach for such traffic modelling tasks. Published in: IEEE Networking Letters ( Volume: 1, Issue: 2, June 2019)…
read moreSwingxficgenerator (v0.3.2) This is a re-upload for the Swing Traffic Generator. Its official homepage is located HERE. The swing traffic generator is a tool used in the publication Swing: Realistic and Responsive Network Traffic Generation. But the original source code has a compilation error, and I fixed it. I tried to contact the author some times by email, but with no response. If the author, or anyone related with the project find this repository, please, contact me. Since the Author Kashi Venkatesh Vishwanath allowed to redistribute the code, according to its LICENCE I decided publish it here, so anyone can…
read moreSwingxficgenerator (v0.3.2) This is a re-upload for the Swing Traffic Generator. Its official homepage is located HERE. The swing traffic generator is a tool used in the publication Swing: Realistic and Responsive Network Traffic Generation. But the original source code has a compilation error, and I fixed it. I tried to contact the author some times by email, but with no response. If the author, or anyone related with the project find this repository, please, contact me. Since the Author Kashi Venkatesh Vishwanath allowed to redistribute the code, according to its LICENCE I decided publish it here, so anyone can…
read moreAbstract: Real network traffic has a different impact over network nodes if compared to constant traffic generated by tools like Iperf, even when they have the same average throughput. Busty traffic may cause buffers overflows while constant traffic does not, and can decrease the measurement accuracy. The number of flows may have an impact on flow-oriented nodes, such as SDN switches and controllers. In a scenario where software-defined networks will play an essential role in the future internet, a more in-depth validation of new technologies considering these aspects is crucial. Also, most of the open-source realistic traffic generator tools have…
read moreAbstract: New emerging technologies have a larger unpredictability, compared to legacy equipment. They require a larger set of meaningful tests on many different scenarios. But, in the open source world is hard to find a single tool able to provide realism, speed, easy usage and flexibility at the same time. Most of the tools are monolithic and devoted to specific purposes. This work presents a flexible and extensible framework which aims to decouple synthetic traffic modelling from its traffic generator engine. Through a new abstraction layer, it would become possible to use modern and throughput optimized tools to create realistic…
read moreSwingxficgenerator (v0.3.2) This is a re-upload for the Swing Traffic Generator. Its official homepage is located HERE. The swing traffic generator is a tool used in the publication Swing: Realistic and Responsive Network Traffic Generation. But the original source code has a compilation error, and I fixed it. I tried to contact the author some times by email, but with no response. If the author, or anyone related with the project find this repository, please, contact me. Since the Author Kashi Venkatesh Vishwanath allowed to redistribute the code, according to its LICENCE I decided publish it here, so anyone can…
read moreAbstract: Real network traffic has a different impact over network nodes if compared to constant traffic generated by tools like Iperf, even when they have the same average throughput. Busty traffic may cause buffers overflows while constant traffic does not, and can decrease the measurement accuracy. The number of flows may have an impact on flow-oriented nodes, such as SDN switches and controllers. In a scenario where software-defined networks will play an essential role in the future internet, a more in-depth validation of new technologies considering these aspects is crucial. Also, most of the open-source realistic traffic generator tools have…
read moreAbstract: A well-known problem of network traffic representation over time is that there is no “one-fits-all” model. The selection of the “best” model is traditionally made in a time-consuming and ad-hoc manner by human experts. In this letter, we evaluate the feasibility of using Bayesian information criterion (BIC) and Akaike information criterion (AIC) as tools for automated selection of the best-fit stochastic process for inter-packet times. We propose and validate a methodology based on information criteria, resulting in an automated and accurate approach for such traffic modelling tasks. Published in: IEEE Networking Letters ( Volume: 1, Issue: 2, June 2019)…
read moreAbstract: In this work, we aim to evaluate how good are the information criteria AIC and BIC inferring which is the best stochastic process to describe Ethernet inter-packet times. Also, we check if there is a practical difference between using AIC or BIC. We use a set of stochastic distributions to represent inter-packet of a traffic trace and calculate AIC and BIC. To test the quality of BIC and AIC guesses, we define a cost function based on the comparison of significant stochastic properties for internet traffic modeling, such as correlation, fractal-level and mean. Then, we compare both results. In…
read moreAbstract: New emerging technologies have a larger unpredictability, compared to legacy equipment. They require a larger set of meaningful tests on many different scenarios. But, in the open source world is hard to find a single tool able to provide realism, speed, easy usage and flexibility at the same time. Most of the tools are monolithic and devoted to specific purposes. This work presents a flexible and extensible framework which aims to decouple synthetic traffic modelling from its traffic generator engine. Through a new abstraction layer, it would become possible to use modern and throughput optimized tools to create realistic…
read moreSwingxficgenerator (v0.3.2) This is a re-upload for the Swing Traffic Generator. Its official homepage is located HERE. The swing traffic generator is a tool used in the publication Swing: Realistic and Responsive Network Traffic Generation. But the original source code has a compilation error, and I fixed it. I tried to contact the author some times by email, but with no response. If the author, or anyone related with the project find this repository, please, contact me. Since the Author Kashi Venkatesh Vishwanath allowed to redistribute the code, according to its LICENCE I decided publish it here, so anyone can…
read more