Sajjad Madani

Sajjad Madani
COMSATS University Islamabad | CUI · Department of Computer Science

About

94
Publications
89,400
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,872
Citations

Publications

Publications (94)
Article
Full-text available
Optimal task allocation in Large-Scale Computing Systems (LSCSs) that endeavors to balance the load across limited computing resources is considered an NP-hard problem. MinMin algorithm is one of the most widely used heuristic for scheduling tasks on limited computing resources. The MinMin minimizes makespan compared to other algorithms, such as He...
Article
Data centre Ethernet (DCE) is a budding research area that has received considerable attention from the ICT sector. The traditional DCEs are considered unreliable despite being widely used in modern day data centres. In Ethernet intermediate layer 2 switching devices, the outgoing traffic is faster than the incoming traffic and therefore results in...
Article
Minimizing energy consumption and network load is a major challenge for network-on-chip (NoC) based multi-processor systems-on-chip (MPSoCs). Efficient task and core mapping can greatly reduce the overall energy consumption and communication overhead among the interdependent tasks. In this paper, we propose a novel Knapsack based bin packing algori...
Article
Multimode capability empowers mobile devices to select the appropriate network to meet the requirements of user and applications. However, network selection is a challenging task owing to heterogeneous nature of network access links. At the same time, pervasiveness of mobile communication networks accompanied by the advances in wireless devices has...
Article
Application performance of video-based services for public safety and security (PSS) systems is of high importance in order to protect citizens, organizations, and institutions against threats to their well-being. Video based services help PSS personnel to efficiently perform their rescue operations. Real-time video streaming of incident-based serv...
Article
Energy estimation of applications helps developers greening the smartphone- and Internet-of-Things-based devices. Traditional energy estimation schemes consider smartphone component’s power measurement or code analysis methods for energy estimation of applications. The existing code analysis method considers the energy cost of software operations t...
Article
Full-text available
Fog and Mobile Edge Computing (FMEC) is a paradigm that augments resource-scarce mobile devices with resource-rich network servers to enable ubiquitous computing. Smartphone applications rely on code offloading techniques to leverage high-performance computing opportunities available on edge and cloud servers for compute-intensive applications. Mob...
Article
Full-text available
Cloud computing provides online services to customers using pay as you go model. Cloud computing enables customers to outsource the large and complex tasks to the cloud data centers for the execution and result generations. Cloud data centers host the incoming tasks by providing resources, such as CPU, RAM, storage, and bandwidth. As the large data...
Book
Full-text available
Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it provides detailed discussion of the utilization of...
Article
Full-text available
Smartphones are computationally constrained compared to server devices due to their size and limited battery based power. Compute-intensive tasks are often offloaded from smartphones to high-performance computing opportunities provided by nearby high-end cloud and edge servers. ARM architectures dominate smartphones while x86 dominate server device...
Article
Full-text available
Inadequate and inappropriate intake of food is known to cause various health issues and diseases. Due to lack of concise information about healthy diet, people have to rely on medicines instead of taking preventive measures in food intake. Due to diversity in food components and large number of dietary sources, it is challenging to perform real-tim...
Article
Recent advances in chip design and integration technologies have led to the development of Single-Chip Cloud computers which are a microcosm of cloud datacenters. Those computers are based on Network-on-Chip (NoC) architectures with deep memory hierarchies. Developing scheduling algorithms to reduce data access latency as well as energy consumption...
Article
Full-text available
There are various algorithms that are designed to satisfy the needs of high performance applications and exhaustive workflows in large-scale computing systems. This work analyzes the impact of optimizing the key performance parameters, such as makespan, power consumption, and resource utilization. Five state of the art heuristics are simulated util...
Article
Full-text available
Recent advancements in location-based recommendation system (LBRS) and the availability of online applications, such as Twitter, Instagram, Foursquare, Path, and Facebook have introduced new research challenges in the area of LBRS. Use of content, such as geo-tagged media, point location-based, and trajectory-based information help in connecting th...
Article
Network congestion poses significant impact on application performance and network throughput in Network-on-Chip (NoC) based systems. Efficient core mapping can significantly reduce the network contention and end-to-end latency leading to improved application performance in NoC based multicore systems. In this work, we propose a Congestion-Aware (C...
Article
Full-text available
In the last decade, the rising trend in the popularity of smartphones motivated software developers to increase application functionality. However, increasing application functionality demands extra power budget that as a result, decreases smartphone battery lifetime. Optimizing energy critical sections of an application creates an opportunity to i...
Article
A number of resource-intensive applications, such as augmented reality, natural language processing, object recognition, and multimedia-based software are pushing the computational and energy boundaries of smartphones. Cloud-based services augment the resource-scare capabilities of smartphones while offloading compute-intensive methods to resource-...
Article
The last decade witnessed a tremendous increase in popularity and usage of social network services, such as Facebook, Twitter, and YouTube. Moreover, advances in Web technologies coupled with social networks has enabled users to not only access, but also generate, content in many forms. The overwhelming amount of produced content and resulting netw...
Article
Full-text available
Delay Tolerant Networks (DTN) are deployed to establish communications in challenging environments with frequent disruptions and delays due to intermittently connecting nodes, such as sparsely distributed wireless sensor networks and mobile ad hoc networks. Routing in such networks is difficult as nodes have little information about the state of th...
Article
Full-text available
Cloud computing has emerged as the leading paradigm for information technology businesses. Cloud computing provides a platform to manage and deliver computing services around the world over the Internet. Cloud services have helped businesses utilize computing services on demand with no upfront investments. The cloud computing paradigm has sustained...
Article
Full-text available
Recent growth in the processing and memory resources of mobile devices has fueled research within the field of mobile virtualization. Mobile virtualization enables multiple persona on a single mobile device by hosting heterogeneous operating systems concurrently. However, adding a virtualization layer to resource constrained mobile devices with rea...
Article
Full-text available
Mobile cloud computing presents an effective solution to overcome smartphone constraints, such as limited computational power, storage, and energy. As the traditional mobile application development models do not support computation offloading, mobile cloud computing requires novel application development models that can facilitate the development o...
Article
Full-text available
Virtualization efficiently manages the ever-increasing demand for storage, computing, and networking resources in large-scale Cloud Data Centers. Virtualization attains multifarious resource management objectives including proactive server maintenance, load balancing, pervasive service availability, power management, and fault tolerance by virtual...
Article
Efficiency of Network-on-Chip (NoC) based multi-processor systems largely depends on optimal placement of tasks onto processing elements (PEs). Although number of task mapping heuristics have been proposed in literature, selecting best technique for a given environment remains a challenging problem. Keeping in view the fact that comparisons in orig...
Chapter
Data centers constitute the foundations of cloud computing. Increased adoption of cloud computing in various sectors of life necessitates the data center growth. Cloud providers are facing numerous challenges in data centers design and operation. This chapter presents the modeling and simulation of the major data center network architectures using...
Chapter
In recent years, significant advancement in the wireless communication technologies, such as Bluetooth, 802.11/WiFi, and ZigBee, has been seen in mobile ad hoc networks (MANETs). Such technologies enable mobile devices to form on-the-fly data centers where nodes opportunistically participate in data storage and sharing applications. In such a setup...
Article
In this survey, we review different text mining techniques to discover various textual patterns from the social networking sites. Social network applications create opportunities to establish interaction among people leading to mutual learning and sharing of valuable knowledge, such as chat, comments, and discussion boards. Data in social networkin...
Article
Full-text available
As we delve deeper into the ‘Digital Age’, we witness an explosive growth in the volume, velocity, and variety of the data available on the Internet. For example, in 2012 about 2.5 quintillion bytes of data was created on a daily basis that originated from myriad of sources and applications including mobile devices, sensors, individual archives, so...
Article
Full-text available
Virtualization is generally adopted in server and desktop environments to provide for fault tolerance, resource management, and energy efficiency. Virtualization enables parallel execution of multiple operating systems (OSs) while sharing the hardware resources. Virtualization was previously not deemed as feasible technology for mobile and embedded...
Article
Full-text available
For the last few years, academia and research organizations are continuously investigating and resolving the security and privacy issues of mobile cloud computing environment. The additional consideration in designing security services for mobile cloud computing environment should be the resource-constrained mobile devices. The execution of computa...
Article
Full-text available
Over the last few years, vehicular ad hoc networks (VANETs) have gained popularity for their interesting applications. To make efficient routing decisions, VANET routing protocols require road traffic density information for which they use density estimation schemes. This paper presents a distributed mechanism for road vehicular density estimation...
Article
Full-text available
This paper presents a novel position-based routing protocol for vehicular ad hoc networks (VANETs) to enhance traffic safety and traffic organization and facilitate driving through a smart transportation system. The protocol is referred to as the traffic flow-oriented routing (TFOR) protocol for VANETs. It considers a real-time urban scenario with...
Article
Full-text available
Due to the limited computational capability of mobile devices, the research organization and academia are working on computationally secure schemes that have capability for offloading the computational intensive data access operations on the cloud/trusted entity for execution. Most of the existing security schemes, such as proxy re-encryption, mana...
Article
Full-text available
Mobile cloud computing is an emerging technology that is gaining popularity as a means to extend the capabilities of resource-constrained mobile devices such as a smartphone. Mobile cloud computing requires specialized application development models that support computation offloading from a mobile device to the cloud. The computation offloading is...
Article
Full-text available
The information and communication technology (ICT) sector has grown exponentially in the recent years. An essential component of the ICT organizations is constituted by the data centers that are densely populated with redun-dant servers and communicational links to ensure the pro-vision of 99.99 % availability of services; a fact responsi-ble for t...
Article
Full-text available
This paper presents a comparison of cluster-based position and non position-based routing protocols for mobile wireless sensor networks to outline design considerations of protocols for mobile environments. The selected protocols are compared on the basis of multiple parameters, which include packet delivery ratio, packet loss, network lifetime, an...
Article
Full-text available
Smartphones are now capable of supporting a wide range of applications, many of which demand an ever increasing computational power. This poses a challenge because smartphones are resource-constrained devices with limited computation power, memory, storage, and energy. Fortunately, the cloud computing technology offers virtually unlimited dynamic r...
Article
Full-text available
To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the secur...
Article
Full-text available
The social computing, such as social networking services (SNSs) and social Networking Platforms (SNPs) provide a coherent medium through which people can be interactive and socialize. The SNP is a Web-based social space, specifically designed for end user-driven applications that facilitate communication, collaboration and sharing of the knowledge...
Conference Paper
Full-text available
Data-aware scheduling in today's large-scale computing systems has become a major complex research issue. This problem becomes even more challenging when data is stored and accessed from many highly distributed servers and energy-efficiency is treated as a main scheduling objective. In this paper we approach the independent batch scheduling in grid...
Article
Opportunistic routing is an emerging research area in Wireless Mesh Networks (WMNs), that exploits the broadcast nature of wireless networks to find the optimal routing solution that maximizes throughput and minimizes packet loss. Opportunistic routing protocols mainly suffer from computational overheads, as most of the protocols try to find the be...
Article
Full-text available
With the mushroom growth of state-of-the-art digital image and video manipulations tools, establishing the authenticity of multimedia content has become a challenging issue. Digital image forensics is an increasingly growing research field that symbolises a never ending struggle against forgery and tampering. This survey attempts to cover the blind...
Conference Paper
Full-text available
While using the cloud storage services on resource constraint mobile device, the mobile user needs to ensure the confidentiality of the critical data before uploading on the cloud storage. The resource limitation of mobile devices restricts mobile users for executing complex security operations using computational power of mobile devices. To make s...
Article
SUMMARY Data centers are experiencing a remarkable growth in the number of interconnected servers. Being one of the foremost data center design concerns, network infrastructure plays a pivotal role in the initial capital investment and ascertaining the performance parameters for the data center. Legacy data center network (DCN) infrastructure lacks...
Article
Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small-sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, bec...
Article
Full-text available
In this paper, we present a load-balancing strategy (Adaptive Load Balancing strategy) for data parallel applications to balance the work load effectively on a distributed system. We study its impact on computation-hungry matrix multiplication application. The ALB strategy enhances the performance with features such as intelligent node selection, p...
Article
Full-text available
Energy consumption of the Information and Communication Technology (ICT) sector has grown exponentially in recent years. A major component of the today’s ICT is constituted by the data centers which have experienced an unprecedented growth in their size and population, recently. The Internet giants like Google, IBM and Microsoft house large data ce...
Article
Full-text available
An optimization of power and energy consumptions is the important concern for a design of modern-day and future computing and communication systems. Various techniques and high performance technologies have been investigated and developed for an efficient management of such systems. All these technologies should be able to provide good performance...
Article
Full-text available
The Information and Communication Technology sector is considered to be a major consumer of energy and has become an active participant in Green House Gas emissions. Lots of efforts have been devoted to make network infrastructure and network protocols power-aware and green. Among these efforts, Adaptive Link Rate (ALR) is one of the most widely di...
Article
Full-text available
In this paper we present a performance evaluation study of three fundamentally different ad-hoc routing protocols using different mobility patterns with special focus on three well-known performance metrics, namely the throughput, the end-to-end delay, and the packet loss. Simulations study is carried out in a standard simulator that provides the s...
Article
Wireless mesh networks (WMNs) have gained considerable popularity in recent times thanks to their self-healing, self-organizing, and self-configuring nature. Because of their ability to provide high throughput and minimum packet delay, WMNs are considered to be favorable for broadband applications. For such applications, WMNs employ multiple channe...
Article
Full-text available
Data Centers (DCs) are experiencing a tremendous growth in the number of hosted servers. Aggregate bandwidth requirement is a major bottleneck to data center performance. New Data Center Network (DCN) architectures are proposed to handle different challenges faced by current DCN architecture. In this paper we have implemented and simulated two prom...
Article
Full-text available
In a Delay Tolerant Network (DTN), the nodes have intermittent connectivity and complete path(s) between the source and destination may not exist. The communication takes place opportunistically when any two nodes enter the effective range. One of the major challenges in DTNs is message forwarding when a sender must select a best neighbor that has...
Article
Full-text available
This paper presents two new routing protocols for mobile sensor networks, viz. power-controlled routing (PCR) and its enhanced version, i.e. Enhanced Power-Controlled Routing (EPCR). In both the protocols, fixed transmission power is employed in the clustering phase but when ordinary nodes are about to send their data to their respective cluster-he...
Article
Full-text available
Load balancing and task partitioning are important components of distributed computing. The optimum performance from the distributed computing system is achieved by using effective scheduling and load balancing strategy. Researchers have well explored CPU, memory, and I/O-intensive tasks scheduling, and load balancing techniques. But one of the mai...