Djamel Sadok

Djamel Sadok
Federal University of Pernambuco | UFPE · Department of Computer Science

About

332
Publications
78,998
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,803
Citations
Citations since 2017
81 Research Items
1370 Citations
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
Additional affiliations
September 1993 - present
Federal University of Pernambuco
Position
  • Professor (Associate)

Publications

Publications (332)
Article
Full-text available
Human-robot collaboration has gained a notable prominence in Industry 4.0, as the use of collaborative robots increases efficiency and productivity in the automation process. However, it is necessary to consider the use of mechanisms that increase security in these environments, as the literature reports that risk situations may exist in the contex...
Article
The path a packet takes when handled by the Linux Kernel has been well established for a long time. Its overhead/bottleneck issues are also known. Nonetheless, complexity has increased with the introduction of new paradigms such as virtual machines, containers, software-defined networks, multicore CPU architectures, etc. Coupled with the need for l...
Chapter
Internet of Things, in particular, the concept of Industrial Internet of Things (IIoT), is one of the key technological pillars of the Fourth Industrial Revolution, also known as Industry 4.0. In this context, one of the areas of interest is safety, whereby multiple intelligent sensors may be permanently connected to a central system to autonomousl...
Article
The network function virtualization (NFV) paradigm replaces hardware‐dependent network functions by virtual network functions (VNFs) that can be deployed in commodity hardware, including legacy servers. Consequently, the use of NFV is expected to reduce operating and capital expenses, as well as improve service deployment operation and management f...
Article
Ultra-low latency (ULL) is a challenging but nonetheless essential network requirement to achieve in many contexts. Industrial automation (IEC/IEEE 60802), in-vehicle communications (IEEE P802.1DG), audio and video bridging (IEEE Std 802.1BA), aerospace, and 5G fronthall (IEEE 802.1CM) applications demand a low network latency in the order of few m...
Article
Full-text available
The advancement of collaborative robotics increases process efficiency. However, humans are still part of the loop in many deployment scenarios. They are unpredictable factors that may potentially become at risk. This work proposes a safety system for Human-Robot Interaction (HRI), called HOSA, and discusses the decisions made from its modular arch...
Article
Full-text available
A practical solution to human-robot collision detection using devices commonly found in workplaces, such as 2D cameras, requires thorough planning and evaluation of network restrictions that may deny timely access to and process important context data collected by IoT devices. In this study, we evaluate the behavior of the AMQP and MQTT application...
Article
Full-text available
This work describes the development of RBOT, a robot-driven radio base station maintenance system. RBS deployment and maintenance tasks are increasing both in complexity and density with the introduction of 5G microcells. The main objective behind our application is to reduce maintenance costs by developing an integrated system based on a robotic a...
Article
By decoupling network service functions from custom-built hardware, network function virtualization is transforming network service provisioning, making large scale telecommunications more flexible, scalable, and agile. Service function chaining often requires network traffic to flow through a specific sequence of virtual network functions (VNFs) t...
Article
Full-text available
The creation of a dataset is time-consuming and sometimes discourages researchers from pursuing their goals. To overcome this problem, we present and discuss two solutions adopted for the automation of this process. Both optimize valuable user time and resources and use video object segmentation with object tracking and 3D projection. In our scenar...
Article
Full-text available
The network function virtualization (NFV) paradigm is an emerging technology that provides network flexibility by allowing the allocation of network functions over commodity hardware, like legacy servers in an IT infrastructure. In comparison with traditional network functions, implemented by dedicated hardware, the use of NFV reduces the operating...
Article
Mobile network traffic prediction is an important input into network capacity planning and optimization. Existing approaches may lack the speed and computational complexity to account for bursting, non‐linear patterns, or other important correlations in time series mobile network data. We compare the performance of two deep learning (DL) architectu...
Article
Full-text available
With the popularity of mobile devices, the next generation of mobile networks has faced several challenges. Different applications have been emerged, with different requirements. Offering an infrastructure that meets different types of applications with specific requirements is one of these issues. In addition, due to user mobility, the traffic gen...
Preprint
Full-text available
The network function virtualization (NFV) paradigm is an emerging technology that provides network flexibility by allowing the allocation of network functions over commodity hardware, like legacy servers in an IT infrastructure. In comparison with traditional network functions, implemented by dedicated hardware, the use of NFV reduces the operating...
Article
For an autonomous system to perform maintenance tasks in a networking device or a radio base station (RBS), it has to deal with a series of technological challenges ranging from identifying hardware-related problems to manipulating connectors. This paper describes the development of a robot maintenance system dedicated to detect and resolve faulty...
Article
Full-text available
Much work has recently identified the need to combine deep learning with extreme learning in order to strike a performance balance with accuracy, especially in the domain of multimedia applications. When considering this new paradigm—namely, the convolutional extreme learning machine (CELM)—we present a systematic review that investigates alternati...
Preprint
Full-text available
Many works have recently identified the need to combine deep learning with extreme learning to strike a performance balance with accuracy especially in the domain of multimedia applications. Considering this new paradigm, namely convolutional extreme learning machine (CELM), we present a systematic review that investigates alternative deep learning...
Article
A data center infrastructure is composed of heterogeneous resources divided into three main subsystems: IT (processor, memory, disk, network, etc.), power (generators, power transformers, uninterruptible power supplies, distribution units, among others), and cooling (water chillers, pipes, and cooling tower). This heterogeneity brings challenges fo...
Article
Full-text available
To minimise environmental impact, to avoid regulatory penalties, and to improve competitiveness, energy-intensive manufacturing firms require accurate forecasts of their energy consumption so that precautionary and mitigation measures can be taken. Deep learning is widely touted as a superior analytical technique to traditional artificial neural ne...
Preprint
Full-text available
Mobile network traffic prediction is an important input in to network capacity planning and optimization. Existing approaches may lack the speed and computational complexity to account for bursting, non-linear patterns or other important correlations in time series mobile network data. We compare the performance of two deep learning architectures -...
Chapter
The increasing adoption of industrial robots to boost production efficiency is turning human-robot collaborative scenarios much more frequent. In this context, technical factory workers need to be safe at all times from collisions and prepare for emergencies and potential accidents. Another trend in industrial automation is the usage of machine lea...
Preprint
Full-text available
To minimise environmental impact, avoid regulatory penalties, and improve competitiveness, energy-intensive manufacturing firms require accurate forecasts of their energy consumption so that precautionary and mitigation measures can be taken. Deep learning is widely touted as a superior analytical technique to traditional artificial neural networks...
Article
Full-text available
This last decade, the amount of data exchanged on the Internet increased by over a staggering factor of 100, and is expected to exceed well over the 500 exabytes by 2020. This phenomenon is mainly due to the evolution of high-speed broadband Internet and, more specifically, the popularization and wide spread use of smartphones and associated access...
Preprint
This last decade, the amount of data exchanged in the Internet increased by over a staggering factor of 100, and is expected to exceed well over the 500 exabytes by 2020. This phenomenon is mainly due to the evolution of high speed broadband Internet and, more specifically, the popularization and wide spread use of smartphones and associated access...
Chapter
Full-text available
The number of connected devices and the amount of data traffic exchanged through mobile networks is expected to double in the near future. Long Term Evolution (LTE) and fifth generation (5G) technologies are evolving to support the increased volume, variety and velocity of data and new interfaces the Internet of Things demands. 5G goes beyond incre...
Article
Full-text available
The Internet is one of the most important innovations of humanity and has brought many of our social and cultural changes. The web pages have great importance because they are the opening door for which users can interact directlywith each other and interact with corporations. A bad performance may result in a significant loss from millions of user...
Article
Next‐generation cloud data centers are based on software‐defined data center infrastructures that promote flexibility, automation, optimization, and scalability. The Redfish standard and the Intel Rack Scale Design technology enable software‐defined infrastructure and disaggregate bare‐metal compute, storage, and networking resources into virtual p...
Chapter
Full-text available
Since the industrial revolution, the manufacturing process has evolved. Robots played a key role in this evolution, as their performance has advantages in environments that are uncomfortable and dangerous for humans [1]. However, robots face challenges in dynamic, error-prone environments such as industrial environments [2]. Therefore, despite all...
Conference Paper
Recentemente, o protocolo HTTP foi atualizado e recebeu diversas modificações, direcionadas principalmente a melhorias na utilização dos recursos da rede. Dentre estas melhorias, pode-se citar a adição do recurso push, que permite que o servidor responda a uma solicitação com mais de um recurso simultaneamente. Este trabalho apresenta uma análise d...
Article
Traditional data center infrastructure suffers from a lack of standard and ubiquitous management solutions. Despite the achieved contributions, existing tools lack interoperability and are hardware dependent. Vendors are already actively participating in the specification and design of new standard software and hardware interfaces within different...
Article
Full-text available
Today, most innovation on Information Technology and Communication is cloud-centric and an increasing number of organizations believe that this transition is ever more unavoidable. With this increased demand for Cloud services, providers are facing many challenges regarding how to avoid outages and optimization of resource management since they imp...
Article
The development of electronic design evolves every day. The adequate selection of electronic components is at the heart of a project's success. Therefore, it is necessary to make a preliminary study of the characteristics of the components to be used in order to select the most appropriate ones for each application. For a smart plug project, an ess...
Article
E-health systems can be used to monitor people in real-time, offering a range of multimedia-based health services, at the same time reducing the cost since cheaper devices can be used to compose it. However, any downtime, mainly in the case of critical health services, can result in patient health problems and in the worst case, loss of life. In th...
Article
E-health systems can be used to monitor people in real-time, offering a range of multimedia-based health services, at the same time reducing the cost since cheaper devices can be used to compose it. However, any downtime, mainly in the case of critical health services, can result in patient health problems and in the worst case, loss of life. In th...
Article
Cooling plays a very important role in data centre availability by mitigating the overheating of Information Technology (IT) equipment. While many existing works evaluated the performance of the cooling sub-systems in data centres, only a few studies have considered the important relationship between cooling and IT sub-systems. This work provides e...
Article
Cooling plays a critical role in data center availability by mitigating the overheating of Information Technology (IT) equipment. While many existing works evaluated the performance of the cooling sub-systems in data centers, only a few studies have considered the important relationship between cooling and IT sub-systems. This work provides efficie...
Conference Paper
To meet service level agreement (SLA) requirements, the majority of enterprise IT infrastructure is typically overpro-visioned, underutilized, non-compliant and lacking in required agility resulting in significant inefficiencies. As enterprises introduce and migrate to next-generation applications designed to be horizontally scalable, they require...
Article
Full-text available
Abstract This work surveys Internet of Things (IoT) experimental research published since 2015. We summarize the IoT state of the art during the last 2 years and extract important data that we apply to enhance the analysis of IoT solutions. The IoT scenario presents a promising universe to data analysis. This raises a number of questions: which are...
Article
Full-text available
Cloud data center providers benefit from software-defined infrastructure once it promotes flexibility, automation, and scalability. The new paradigm of software-defined infrastructure helps facing current management challenges of a large-scale infrastructure, and guarantying service level agreements with established availability levels. Assessing t...
Article
To assess the availability of different data center configurations, understand the main root causes of data center failures and represent its low‐level details, such as subsystem's behavior and their interconnections, we have proposed, in previous works, a set of stochastic models to represent different data center architectures (considering three...
Article
Large data centers are complex systems that depend on several generations of hardware and software components, ranging from legacy mainframes and rack-based appliances to modular blade servers and modern rack scale design solutions. To cope with this heterogeneity, the data center manager must coordinate a multitude of tools, protocols, and standar...
Conference Paper
Organizations worldwide are rapidly migrating their IT services and infrastructure to cloud data centers in order to reduce costs and guarantee high availability, scalability, and security. Considering that service downtime translates into major financial losses, new mechanisms need to be developed to assess the availability of cloud data center dy...
Article
The increasing attacks against Internet of Things (IoT) systems are a determining factor to focus attention on IoT security. The use of Smart Cards (SCs) to protect these systems is pertinent, as they are resistant to physical attacks, portable, and have low cost. Nonetheless, SC processing and memory capacity are not sufficient to meet IoT demands...
Article
Emergency call services are expected to be highly available in order to minimize the loss of urgent calls and, as a consequence, minimize loss of life due to lack of timely medical response. This service availability depends heavily on the cloud data center on which it is hosted. However, availability information alone cannot provide sufficient und...
Chapter
This chapter reviews the literature with regarding to the use of modeling techniques to represent and evaluate an integrated cloud‐to‐thing (C2T) system comprising cloud computing, fog computing, and the Internet‐of‐Things (IoT). It describes the methodology adopted to guide the literature review and provides a descriptive analysis of the final wor...
Article
Users pay for running their applications on cloud infrastructure, and in return they expect high availability, and minimal data loss in case of failure. From a cloud provider perspective, any hardware or software failure must be detected and recovered as quickly as possible to maintain users' trust and avoid financial losses. From a user's perspect...
Article
Full-text available
The Internet of Things has the potential of transforming health systems through the collection and analysis of patient physiological data via wearable devices and sensor networks. Such systems can offer assisted living services in real-time and offer a range of multimedia-based health services. However, service downtime, particularly in the case of...
Article
Full-text available
Network traffic classification aims to identify categories of traffic or applications of network packets or flows. It is an area that continues to gain attention by researchers due to the necessity of understanding the composition of network traffics, which changes over time, to ensure the network Quality of Service (QoS). Among the different metho...
Conference Paper
Current Internet transport protocols are being revisited in an attempt to respond to traffic growth in size, diversity and the emergence of new applications. Designed to reduce Web TCP latency and connection establishment time, QUIC uses UDP and defines its own congestion control. To verify some of QUIC's performance claims, we carried out an exten...
Conference Paper
The Internet of Things already comprehends billions of connected smart devices. The related issues are vast as well, ranging from the lack of standardized communication to big data management. This paper presents IoT Management and Monitoring System (IMMS), a solution focused on the management of big environments such as smart cities. The proposed...
Article
Full-text available
The Internet's default inter-domain routing protocol is the Border Gateway Protocol (BGP). With the BGP, dozens of thousands of Autonomous Systems (ASs) exchange network layer reachability information to manage connectivity among them. The BGP was introduced in the early stages of the Internet, and although the BGP is one of the most successful pro...
Chapter
The evolution of software service delivery has changed the way accountability is performed. The complexity related to cloud computing environments increases the difficulty in properly performing accountability, since the evidences are spread through the whole infrastructure, from different servers at physical, virtualization, and application layers...
Chapter
Full-text available
Cloud-based solution adoption is becoming an indispensable strategy for enterprises, since it brings many advantages, such as low cost. On the other hand, to attend this demand, cloud providers are facing a great challenge regarding their resource management: how to provide services with high availability relying on finite computational resources a...
Article
Guaranteeing high levels of availability is a huge challenge for cloud providers. The authors look at the causes of cloud failures and recommend ways to prevent them and to minimize their effects when they occur.