Judith Kelner

Judith Kelner
Federal University of Pernambuco | UFPE · Center of Informatics (CIn)

PhD in Computer Science

About

319
Publications
75,672
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,564
Citations
Citations since 2016
106 Research Items
1371 Citations
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250

Publications

Publications (319)
Article
Full-text available
Camera calibration is the process of extract the intrinsic and extrinsic parameters of a camera. Those parameters guide the 3-dimensional localization into relation to the 2-dimensional space from the images acquired by the camera. The 3-dimensional correlation can be generated with an object with known measures, being the most common checkerboard...
Article
The path a packet takes when handled by the Linux Kernel has been well established for a long time. Its overhead/bottleneck issues are also known. Nonetheless, complexity has increased with the introduction of new paradigms such as virtual machines, containers, software-defined networks, multicore CPU architectures, etc. Coupled with the need for l...
Preprint
Full-text available
Background Communicable diseases represent a huge economic burden for healthcare systems and for society. Sexually transmitted infections (STIs) are a concerning issue, especially in developing and underdeveloped countries, in which environmental factors and other determinants of health play a role in contributing to its fast spread. In light of th...
Article
The network function virtualization (NFV) paradigm replaces hardware‐dependent network functions by virtual network functions (VNFs) that can be deployed in commodity hardware, including legacy servers. Consequently, the use of NFV is expected to reduce operating and capital expenses, as well as improve service deployment operation and management f...
Article
Full-text available
The popularization of the Linux kernel at data center servers became a significant factor to consider when developing or deploying network applications. New "packet processing frameworks" emerged to ensure fast packet processing inside these servers that rely on the Linux kernel, XDP and DPDK being the two main ones. Alongside this, Cloud Computing...
Article
Full-text available
A Radio Base Station (RBS), part of the Radio Access Network, is a particular type of equipment that supports the connection between a wide range of cellular user devices and an operator network access infrastructure. Nowadays, most of the RBS maintenance is carried out manually, resulting in a time consuming and costly task. A suitable candidate f...
Article
Ultra-low latency (ULL) is a challenging but nonetheless essential network requirement to achieve in many contexts. Industrial automation (IEC/IEEE 60802), in-vehicle communications (IEEE P802.1DG), audio and video bridging (IEEE Std 802.1BA), aerospace, and 5G fronthall (IEEE 802.1CM) applications demand a low network latency in the order of few m...
Article
Full-text available
The advancement of collaborative robotics increases process efficiency. However, humans are still part of the loop in many deployment scenarios. They are unpredictable factors that may potentially become at risk. This work proposes a safety system for Human-Robot Interaction (HRI), called HOSA, and discusses the decisions made from its modular arch...
Article
Full-text available
A practical solution to human-robot collision detection using devices commonly found in workplaces, such as 2D cameras, requires thorough planning and evaluation of network restrictions that may deny timely access to and process important context data collected by IoT devices. In this study, we evaluate the behavior of the AMQP and MQTT application...
Article
Full-text available
This work describes the development of RBOT, a robot-driven radio base station maintenance system. RBS deployment and maintenance tasks are increasing both in complexity and density with the introduction of 5G microcells. The main objective behind our application is to reduce maintenance costs by developing an integrated system based on a robotic a...
Article
Full-text available
The present research focuses in the comparison of two social robot models running the same Human-Robot Interaction (HRI) applications targeting the context of music education for children aged 9-11, with the objective of underlying the design choices favored by the target audience on the running tasks. The Guitar Tuner consists of two main function...
Article
By decoupling network service functions from custom-built hardware, network function virtualization is transforming network service provisioning, making large scale telecommunications more flexible, scalable, and agile. Service function chaining often requires network traffic to flow through a specific sequence of virtual network functions (VNFs) t...
Preprint
Full-text available
Human-robot collaboration has gained a notable prominence in Industry 4.0, as the use of collaborative robots increases efficiency and productivity in the automation process. However, it is necessary to consider the use of mechanisms that increase security in these environments, as the literature reports that risk situations may exist in the contex...
Preprint
IoT devices suffer from resource limitations, such as processor, RAM, and disc storage. These limitations become more evident when handling demanding applications, such as deep learning, well-known for their heavy computational requirements. A case in point is robot pose estimation, an application that predicts the critical points of the desired im...
Article
Full-text available
The creation of a dataset is time-consuming and sometimes discourages researchers from pursuing their goals. To overcome this problem, we present and discuss two solutions adopted for the automation of this process. Both optimize valuable user time and resources and use video object segmentation with object tracking and 3D projection. In our scenar...
Article
Full-text available
Background The Brazilian healthcare system is a large and complex system, specially considering its mixed public and private funding. The incidence of syphilis has increased in the last four years, in spite of the presence of an effective and available treatment. Furthermore, syphilis takes part in a group of disorders of compulsory notification to...
Preprint
Full-text available
The popularization of the Linux kernel at data center servers became a significant factor to consider when developing or deploying network applications. New “packet processing frameworks” emerged to ensure fast packet processing inside these servers that rely on the Linux kernel , XDP and DPDK being the two main ones. Alongside this, Cloud Computin...
Article
Full-text available
The network function virtualization (NFV) paradigm is an emerging technology that provides network flexibility by allowing the allocation of network functions over commodity hardware, like legacy servers in an IT infrastructure. In comparison with traditional network functions, implemented by dedicated hardware, the use of NFV reduces the operating...
Article
Full-text available
The introduction of technological innovations is essential for accident mitigation in work environments. In a human-robot collaboration scenario, the current number of accidents raises a safety problem that must be dealt. This work proposes an intelligent system that aims to address such problems using deep and machine learning techniques. More spe...
Article
Full-text available
Ultra-low latency (ULL) is a challenging but nonetheless important network requirement to achieve in many contexts. Industrial automation (IEC/IEEE 60802), in vehicle communications (IEEE P802.1DG), audio and video bridging (IEEE Std 802.1BA), aerospace and 5G fronthall (IEEE 802.1CM) applications demand a low network latency in the order of few mi...
Article
Virtualization is omnipresent in our networks and data centers. Little is known of its overhead, especially regarding the deployment of Virtual Network Functions and the use of existing network active measurement tools. This paper evaluates the impact on Round-Trip Time of parameters such as CPU affinity, the frequency of injection measurements ech...
Preprint
Full-text available
Background: The Brazilian health system is a large and complex system, especially considering its mixed public and private funding. The number of syphilis cases has been increasing greatly in the last four years, even though it has a cheap and simple treatment. Syphilis notification is compulsory by law, and public health surveillance pays great im...
Preprint
Full-text available
Background: The Brazilian health system is a large and complex system, specially considering its mixed public and private funding. The amount of syphilis case has been increasing greatly in the last four years, even though it has cheap and simple treatment. The syphilis notification are compulsory by law and the public health surveillance pays grea...
Article
Full-text available
Software-defined networking and network functions virtualisation are making networks programmable and consequently much more flexible and agile. To meet service-level agreements, achieve greater utilisation of legacy networks, faster service deployment, and reduce expenditure, telecommunications operators are deploying increasingly complex service...
Article
Mobile network traffic prediction is an important input into network capacity planning and optimization. Existing approaches may lack the speed and computational complexity to account for bursting, non‐linear patterns, or other important correlations in time series mobile network data. We compare the performance of two deep learning (DL) architectu...
Article
Full-text available
Background Although considerable success in reducing the incidence of malaria has been achieved in Brazil in recent years, an increase in the proportion of cases caused by the harder-to-eliminate Plasmodium vivax parasite can be noted. Recurrences in P. vivax malaria cases are due to new mosquito-bite infections, drug resistance or especially from...
Article
Full-text available
Human–robot collaboration is increasingly present not only in research environments, but also in industry and many contemporary day-to-day activities. There is a need for the automation of tasks ranging from the simplest to the most complex ones. The insertion of robotic arms provides a considerable step useful in achieving this goal. In this conte...
Article
Full-text available
With the popularity of mobile devices, the next generation of mobile networks has faced several challenges. Different applications have been emerged, with different requirements. Offering an infrastructure that meets different types of applications with specific requirements is one of these issues. In addition, due to user mobility, the traffic gen...
Preprint
Full-text available
Background: Although considerable success in reducing the incidence of malaria has been achieved in Brazil in recent years, an increase in the proportion of cases caused by the harder-to-eliminate Plasmodium vivax parasite can be noted. Recurrences in P. vivax malaria cases are due to new mosquito-bite infections, drug resistance or especially from...
Preprint
Full-text available
The network function virtualization (NFV) paradigm is an emerging technology that provides network flexibility by allowing the allocation of network functions over commodity hardware, like legacy servers in an IT infrastructure. In comparison with traditional network functions, implemented by dedicated hardware, the use of NFV reduces the operating...
Article
For an autonomous system to perform maintenance tasks in a networking device or a radio base station (RBS), it has to deal with a series of technological challenges ranging from identifying hardware-related problems to manipulating connectors. This paper describes the development of a robot maintenance system dedicated to detect and resolve faulty...
Article
Full-text available
Much work has recently identified the need to combine deep learning with extreme learning in order to strike a performance balance with accuracy, especially in the domain of multimedia applications. When considering this new paradigm—namely, the convolutional extreme learning machine (CELM)—we present a systematic review that investigates alternati...
Preprint
Full-text available
Many works have recently identified the need to combine deep learning with extreme learning to strike a performance balance with accuracy especially in the domain of multimedia applications. Considering this new paradigm, namely convolutional extreme learning machine (CELM), we present a systematic review that investigates alternative deep learning...
Article
A Toy User Interface (ToyUI) is a setup combination of one or more toy components with other hardware or software components. As part of new technologies that permeate the Child-Computer Interaction (CCI) domain, a ToyUI can combine physical toy components with social robots, smartphones, tablets, game consoles, among other computing artifacts. Thi...
Article
A data center infrastructure is composed of heterogeneous resources divided into three main subsystems: IT (processor, memory, disk, network, etc.), power (generators, power transformers, uninterruptible power supplies, distribution units, among others), and cooling (water chillers, pipes, and cooling tower). This heterogeneity brings challenges fo...
Preprint
Full-text available
Software defined networking (SDN) and network functions virtualisation (NFV) are making networks programmable and consequently much more flexible and agile. To meet service level agreements, achieve greater utilisation of legacy networks, faster service deployment, and reduce expenditure, telecommunications operators are deploying increasingly comp...
Preprint
Full-text available
Mobile network traffic prediction is an important input in to network capacity planning and optimization. Existing approaches may lack the speed and computational complexity to account for bursting, non-linear patterns or other important correlations in time series mobile network data. We compare the performance of two deep learning architectures -...
Chapter
The increasing adoption of industrial robots to boost production efficiency is turning human-robot collaborative scenarios much more frequent. In this context, technical factory workers need to be safe at all times from collisions and prepare for emergencies and potential accidents. Another trend in industrial automation is the usage of machine lea...
Article
Full-text available
This last decade, the amount of data exchanged on the Internet increased by over a staggering factor of 100, and is expected to exceed well over the 500 exabytes by 2020. This phenomenon is mainly due to the evolution of high-speed broadband Internet and, more specifically, the popularization and wide spread use of smartphones and associated access...
Preprint
This last decade, the amount of data exchanged in the Internet increased by over a staggering factor of 100, and is expected to exceed well over the 500 exabytes by 2020. This phenomenon is mainly due to the evolution of high speed broadband Internet and, more specifically, the popularization and wide spread use of smartphones and associated access...
Chapter
Full-text available
The number of connected devices and the amount of data traffic exchanged through mobile networks is expected to double in the near future. Long Term Evolution (LTE) and fifth generation (5G) technologies are evolving to support the increased volume, variety and velocity of data and new interfaces the Internet of Things demands. 5G goes beyond incre...
Article
Next‐generation cloud data centers are based on software‐defined data center infrastructures that promote flexibility, automation, optimization, and scalability. The Redfish standard and the Intel Rack Scale Design technology enable software‐defined infrastructure and disaggregate bare‐metal compute, storage, and networking resources into virtual p...
Article
Traditional data center infrastructure suffers from a lack of standard and ubiquitous management solutions. Despite the achieved contributions, existing tools lack interoperability and are hardware dependent. Vendors are already actively participating in the specification and design of new standard software and hardware interfaces within different...
Chapter
The smart toy industry faces challenges to achieve Hardware and Software (H&S) integration since numerous products are not generating enduring value propositions to the consumers. It is possible to achieve better H&S integration by following suitable design practices. Here, we propose four Human-Centered Design (HCD) tools for the development of sm...
Conference Paper
Smart toys have become popular as technological solutions offer a better experience for children. However, the technology used increases the risks to children’s privacy, which does not seem to have become a real concern for toy makers. Most researchers in this domain are vague in defining their motivations due to lack of an expert survey to support...
Conference Paper
Full-text available
Rapid prototyping tools turn the design of smart toys faster and easier for creative teams. Appropriate tools for smart toys should meet a list of requirements, which include distributed data collection and adaptability for assorted toy shapes and size. The IoT4Fun toolkit innovates by mixing the embedded, modular, and plug-and-play approaches. It...
Article
Full-text available
Today, most innovation on Information Technology and Communication is cloud-centric and an increasing number of organizations believe that this transition is ever more unavoidable. With this increased demand for Cloud services, providers are facing many challenges regarding how to avoid outages and optimization of resource management since they imp...
Article
Smart toys have become popular as technological solutions offer a better experience for children. However, the technology employed greatly increases the risks to children's privacy, which does not seem to have become a real concern for toy makers. We investigated this issue through a study driven by two major research questions: which are the major...