Diogo Nuno Pereira Gomes

Diogo Nuno Pereira Gomes
University of Aveiro | UA · Telecommunications Institute (IT)

Phd

About

151
Publications
30,091
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
804
Citations
Introduction
Additional affiliations
September 2003 - present
University of Aveiro
Position
  • Researcher
September 2010 - present
University of Aveiro
Position
  • Professor
Education
November 2004 - February 2010
University of Aveiro
Field of study
  • Electrotecnia

Publications

Publications (151)
Conference Paper
Full-text available
The evolution of 5G and B5G networks is revolutionizing mobile communications and enabling new use cases. Consequently, vertical industries are relying more on advanced applications that can leverage the potential of such innovations-the so-called Network Applications. However, testing frameworks for these advanced Network Applications remain scarc...
Conference Paper
Full-text available
This work presents an architecture for automated service migration in Multi-access Edge Computing (MEC)-Network Functions Virtualization (NFV) environments in a user mobility scenario. A Proof of Concept (PoC) was implemented, illustrating how the system monitors latency metrics and Service-level Agreement (SLA) conditions to perform seamless appli...
Conference Paper
Full-text available
Network Functions Virtualization (NFV) and Multi-access Edge Computing (MEC) represent significant advancements in the telecommunications industry, addressing critical issues related to cost, complexity, and service agility. In MEC, it is essential to ensure seamless service migration to guarantee the system's optimal performance. Our proposed arch...
Article
Full-text available
The current growth of machine learning (ML) enabled the commercialization of several applications, such as data analytics, autonomous systems, and security diagnostics. These models are becoming pervasive in most systems and are deployed into every possible domain. Hand in hand with this growth are security and privacy issues. Although such issues...
Conference Paper
Full-text available
This work explores the integration of Cooperative, Connected and Automated Mobility (CCAM) and Public Protection and Disaster Relief (PPDR) applications with 5G networks to enhance automotive PPDR scenarios. We propose an architecture that enables PPDR-related applications to interact with CCAM ones in order to disseminate real-time CCAM emergency...
Conference Paper
Full-text available
All vehicles on the road require maintenance as parts wear out. To respond to the need for new units without over or underestimating, it is essential to have a forecast model that indicates the quantity of parts needed with minimal possible error. All vehicles have thousands of parts, and each part is compatible with only a small set of vehicle ser...
Conference Paper
Full-text available
With the exponential growth of mobile network traffic and diverse application demands, traditional network management methods struggle to meet the stringent requirements of 5th Generation (5G) and Beyond-5G (B5G) networks. Artificial Intelligence (AI), particularly Deep Learning (DL), has emerged as a promising solution. However, large and complex...
Conference Paper
Full-text available
Serverless computing is becoming increasingly relevant in the cloud and applied in other fields, such as telecom. This paper proposes the Moving Functions as a Service (MoFaaS) system, a Moving Target Defense (MTD) and N-Version Programming (NVP)-based approach designed to improve the protection of applications and services built using Function as...
Article
Full-text available
Once Female students in Informatics and Technology (IT) and Computer Science degrees at European higher education institutions, in the 21st century, represent a smaller percentage compared with male students, this paper investigates the main reasons that may explain this fact, as well as presents new pedagogical strategies for female students in IT...
Conference Paper
Full-text available
This article presents the development and implementation of an intelligent assistant for smart energy management in an industrial setting. The project, developed in collaboration with Bosch Termotecnologia Aveiro, aims to leverage the advancements of Industry 4.0 and address the increasing demands for efficiency, quality and sustainability in indus...
Article
Full-text available
We propose a constraint-based algorithm, which automatically determines causal relevance thresholds, to infer causal networks from data. We call these topological thresholds. We present two methods for determining the threshold: the first seeks a set of edges that leaves no disconnected nodes in the network; the second seeks a causal large connecte...
Conference Paper
This article presents the development and implementation of an intelligent assistant for smart energy management in an industrial setting. The project, developed in collaboration with Bosch Termotecnologia Aveiro, aims to leverage the advancements of Industry 4.0 and address the increasing demands for efficiency, quality and sustainability in indus...
Chapter
Full-text available
Recent machine learning breakthroughs in computer vision and natural language processing were possible due to Deep Neural Networks (DNNs) learning capabilities. Even so, applying DNNs is quite challenging, as they usually have more hyperparameters than shallow models. The higher number of hyperparameters leads to allocating more time for model opti...
Article
Full-text available
The rise of the Internet of Things (IoT) has led to an exponential increase in data generated by connected devices. Machine Learning (ML) has emerged as a powerful tool to analyze these data and enable intelligent IoT applications. However, developing and managing ML applications in the decentralized Cloud-to-Things continuum is extremely complex....
Article
Full-text available
Most modern 5G Vertical Service Orchestrators present various limitations. Among these, one may high-light (i) the employment of monolithic architectures, (ii) the lack of standardized APIs and methodologies, (iii) the minimum support for inter-domain scenarios, and (iv) the impossibility of performing run-time operations over Vertical Services. To...
Conference Paper
Inter-domain scenarios are immensely desirable in NFV since they allow network services to span across independent domains. However, providing a communication channel between the services' components in different domains is challenging, thus the need for mechanisms to simplify and automate this process. One possible approach to this problem is the...
Conference Paper
Full-text available
Recently, machine-learning model sizes have grown considerably. Consequently, training the model on a single high-end machine can take up to several months. Since waiting such a long time is not feasible for most practical applications, a new approach was proposed. This approach, named distributed learning, leverages multiple computing nodes on a s...
Article
Full-text available
The Internet of Things (IoT) paradigm has been one of the main contributors, in recent years, to the growth in the number of connected equipment. This fact has predominantly contributed to IoT being constrained by the 5th Generation Mobile Network (5G) progress and the promises this technology brings. However, this can be a double-edged sword. On t...
Conference Paper
The lack of testing and validation mechanisms for 5G Network Applications poses a severe challenge in ensuring their correct behavior and in reducing their time to market. This work addresses the intricate complexities of validating such Applications and defines some research questions related to this research field. These questions focus on proble...
Conference Paper
NFV has risen to be a solution to abstract Network Functions from the hardware, providing numerous advantages to Network Operators. However, many challenges have appeared with the evolution of NFV. An example are the inter-domain scenarios where services are spanned across multiple independent domains. Using VPNs to interconnect all domains can att...
Article
Full-text available
In this work, we share the dataset collected during the Smart Green Homes (SGH) project. The project’s goal was to develop integrated products and technology solutions for households, as well as to improve the standards of comfort and user satisfaction. This was to be achieved while improving household energy efficiency and reducing the usage of ga...
Conference Paper
Current 5G vertical service orchestration solutions suffer from several limitations, mainly: (i) lack of standardization , (ii) monolithic architectures, and (iii) low support for inter-domain scenarios, for instance. This paper proposes the development of a new 5G vertical service orchestration platform that solves these problems and supports intr...
Article
Full-text available
The technological world has grown by incorporating billions of small sensing devices, collecting and sharing large amounts of diversified data over the new generation of wireless and mobile networks. We can use semantic similarity models to help organize and optimize these devices. Even so, many of the proposed semantic similarity models do not con...
Conference Paper
5G mobile communications are bringing a plethora of applications that are challenging existing network infrastructures. These services demand a dynamic, flexible and adaptive infrastructure capable of fulfilling the rigorous requirements they need to operate correctly. Another key point is the need of real-time reactions in the architecture configu...
Conference Paper
The 5G system promises to deliver an environment for applications and markets that can easily capitalize on the new services and advanced interfaces that the 5G developments introduce. Recently, in the context of European research and innovation actions, the term NetApp was introduced. A NetApp, in the context of the 5G System, is defined as a set...
Conference Paper
Full-text available
The Internet of things (IoT) is an ecosystem of smart connected devices that exchange data over a communication network. By integrating these devices into different vertical applications, the IoT has the potential to have a major impact on both the economy and society. However, the plethora of heterogeneous devices with varying ways of describing t...
Conference Paper
Although 5G technologies are becoming widespread, the development and validation of 5G applications are still challenging. This demo paper showcases 5GASP's onboarding, deployment, and validation methodologies and how they facilitate and speed up this process.
Article
Full-text available
Monitoring road traffic is extremely important given the possibilities it opens up in terms of studying the behavior of road users, road design and planning problems, as well as because it can be used to predict future traffic. Especially on highways that connect beaches and larger urban areas, traffic is characterized by having peaks that are high...
Conference Paper
5G technologies provide several advancements regarding low latency and high bandwidth network scenarios, thus enabling new vertical use cases. Nonetheless, the lack of testing and validation mechanisms for NFV-based services poses a severe challenge in reducing their time to market. In this work we showcase a service to automate the validation of 5...
Article
Full-text available
A common issue that occurs after conducting usability tests is how to prioritize issues for the next design iteration, that is, which should enter production first. It is also necessary to prioritize these issues in an easy-to-understand manner for internal stakeholders and in accordance with their criticality. With these two goals in mind, we prop...
Conference Paper
Full-text available
NILM or Non-Intrusive Load Monitoring is the task of disaggregating the energy consumed by a building in the energy consumed by its constituent appliances. With the increase in energy demand, governments started searching for solutions to reduce energy wastage on the demand side, and the deployment of smart meters was one of them. Their purpose was...
Article
Full-text available
Data collection within a real-world environment may be compromised by several factors such as data-logger malfunctions and communication errors, during which no data is collected. As a consequence, appropriate tools are required to handle the missing values when analysing and processing such data. This problem is often tackled via matrix decomposit...
Conference Paper
Full-text available
This paper proposes and validates a Interdomain Network Slicing framework for verticals, allowing them to directly participate in the establishment and control of end-to-end Communication Services deployment across multiple inter-operator domains. The framework progresses the means made available by different standards and research initiatives to e...
Article
Full-text available
IoT platforms have become quite complex from a technical viewpoint, becoming the cornerstone for information sharing, storing, and indexing given the unprecedented scale of smart services being available by massive deployments of a large set of data-enabled devices. These platforms rely on structured formats that exploit standard technologies to de...
Conference Paper
Data collection within a real-world environment may be compromised by several factors such as data-logger malfunctions and communication errors, during which no data is collected. As a consequence, appropriate tools are required to handle the missing values when analysing and processing such data. This problem is often tackled via matrix decomposit...
Conference Paper
Full-text available
As 5G standards have largely matured, further enabling the radical development of 5G networks, the pressure for mobile operators to keep up with widening range of industry and contemporary use cases increases. Consequently, many approaches have emerged from the perspective of the vertical’s interaction with the 5G system especially while onboarding...
Conference Paper
Full-text available
Network Softwarization, the process by which network equipment's are being replaced by software running in a cloud environment, is playing an important role in the transformation of next-generation networks starting with 5G. In this environment, the use of AI/ML aided network automation to perform management tasks is vital to provide a more reliabl...
Conference Paper
Full-text available
The technological world has grown by incorporating billions of small sensing devices, collecting and sharing large amounts of diversified data over the new generation of wireless and mobile networks. Semantic similarity models have been used as a means to organize and optimize devices in constrained environments such as IoT, edge computing, and 5G...
Preprint
Full-text available
Radio astronomy and Space Infrastructures in the Azores have a great scientific and industrial interest because they benefit from a unique geographical location in the middle of the North Atlantic allowing a vast improvement in the sky coverage. This fact obviously has a very high added value for: i) the establishment of space tracking and communic...
Article
Radio astronomy and Space Infrastructures in the Azores have a great scientific and industrial interest because they benefit from a unique geographical location in the middle of the North Atlantic allowing a vast improvement in the sky coverage. This fact obviously has a very high added value for: i) the establishment of space tracking and communic...
Conference Paper
Full-text available
Recent research showed that heating, ventilation and air conditioning systems consume a considerable amount of electricity when compared with the remaining household appliances. Therefore, efficient use of solar energy on these appliances in combination with the Internet of Things (IoT) platforms became a well-researched topic, especially when stor...
Article
Full-text available
Aim/Purpose: In this work, the authors propose an augmented model for human-centered Unified Communications & Collaboration (UC&C) product design and evaluation, which is supported by previous theoretical work. Background: Although the goal of implementing UC&C in an organization is to promote and mediate group dynamics, increasing overall producti...
Conference Paper
Full-text available
Reinforcement Learning has seen some interesting development over the last years, which made it very attractive to use on recommendation scenarios. In this work, we have extended the previously developed pervasive system, which is aware of the conversational context to suggest documents potentially useful to the users, with the ability to use users...
Article
Full-text available
Fifth-generation (5G) networks are envisioned to simultaneously support several services with different connectivity requirements. In this respect, service creation time is a key performance indicator (KPI) for service providers when planning the migration to 5G. For example, the European 5G infrastructure public private partnership (5G-PPP) sugges...
Chapter
In order to adapt to the recent phenomenon of exponential growth of time series data sets in both academic and commercial environments, and with the goal of deriving valuable knowledge from this data, a multitude of analysis software tools have been developed to allow groups of collaborating researchers to find and annotate meaningful behavioral pa...
Article
Full-text available
Heating appliances consume approximately 48 % of the energy spent on household appliances every year. Furthermore, a malfunctioning device can increase the cost even further. Thus, there is a need to create methods that can identify the equipment’s malfunctions and eventual failures before they occur. This is only possible with a combination of...
Article
Full-text available
Delegation of processing tasks to the network has moved from cloud-based schemes to edge computing solutions where nearby servers process requests in a timely manner. Virtualisation technologies have recently given data cloud and network providers the required flexibility to offer such on-demand resources. However, the maintenance of close computin...
Conference Paper
Full-text available
Over the last few years, pervasive systems have seen some interesting development. Nevertheless, human–human interaction can also take advantage of those systems by using their ability to perceive the surrounding environment. In this work, we have developed a pervasive system – named CLASSY – that is aware of the conversational context and suggests...
Conference Paper
Internet of Things (IoT) solutions are becoming very popular since everything can now be processed through a technological service. Currently, data is digital information, creating the need to design platforms and services that fill the gap between data sensors and processing frameworks. IoT Platforms are responsible for attaching data sources with...
Conference Paper
With the advent of smart IoT and M2M scenarios it becomes necessary to develop autonomous systems that optimize themselves with minimal human intervention. One possible method to achieve this is through Knee/elbow point estimation. Most of the time these points represent ideal compromises for parameters , methods and algorithms. However, estimating...
Article
Full-text available
Network slicing emerges as a key technology in next generation networks, boosted by the integration of software‐defined networking and network functions virtualization. However, while allowing resource sharing among multiple tenants, such networks must also ensure the security requirements needed for the scenarios they are employed. This letter pre...
Conference Paper
The recent expansion of metrification on a daily basis has led to the production of massive quantities of data, which in many cases correspond to time series. To streamline the discovery and sharing of meaningful information within time series, a multitude of analysis software tools were developed. However, these tools lack appropriate mechanisms t...
Conference Paper
Full-text available
The fact that most IoT solutions are provided by third parties, along with the pervasiveness of the collected data, raises privacy and security concerns. There is a need to verify which data is being sent to the third party, as well as preventing those channels from becoming an exploitation avenue. We propose to use existing API definition language...
Conference Paper
Full-text available
The increasing number of small, cheap devices full of sensing capabilities lead to an untapped source of information that can be explored to improve and optimize several systems. Yet, hand in hand with this growth goes the increasing difficulty to manage and organize all this new information. In fact, it becomes increasingly difficult to properly e...
Conference Paper
Full-text available
The heterogeneity of 5G requirements commands more complex network architectures, imposing the need for network orchestration. ETSI NFV MANO is the standard which defines a common framework for vendors and operators to integrate their orchestration efforts. In this paper, we evaluated how an ETSI NFV MANO compliant orchestrator (OSM) fares while or...
Conference Paper
Full-text available
Heating appliances such as HVAC systems consume around 48% of the energy power spent on household appliances every year 1. With this in mind, it is relevant to increase the efficiency of those solutions. Moreover, a malfunctioning device can increase this value even further. Thus, there is a need to develop methods that allow the identification of...
Conference Paper
Full-text available
The existence of abnormal values in data sets of day-today actions is common. Usually denoted as outliers, these values are frequently excluded from the dataset. However, in fraud detection, disease diagnosis and other areas, outliers can often add relevant knowledge. In this paper, we present an application of a methodology to detect out-liers in...
Article
Full-text available
Viewers post a lot of TV program-related information on social networks while they are watching TV, especially during its key moments. Therefore, this social buzz has the potential to be used as an automatic editorial criterion. Having this premise in consideration, this paper reports on the nowUP solution, a service developed with the main goal of...
Conference Paper
Estimating the knee/elbow point in curves is a challenging task. However, most of the time these points represent ideal compromises for parameters, methods and algorithms. Nowadays several IoT and M2M scenarios require autonomous systems that optimize themselves with minimal human intervention. Thus, knee/elbow estimation has become an important re...
Conference Paper
Full-text available
In this paper, we propose an architecture based on NFV and SDN which allows to balance traffic analysis techniques using a Classifier. It steers flows to the appropriate Service Function Chaining (to open traffic or not) according to network requirements (such as, effectiveness, flexibility, scalability, performance, and privacy). The SSL/TLS traff...
Article
Full-text available
Mobile networks today see increasingly large numbers of connected user equipments (UE), allowing users to go beyond voice calling and tap into rich on-line services. Parallel to this evolution, other devices, such as TV’s, home automation or even Internet of Things controllers, have become integrated with connectivity capabilities, allowing them to...