Djamel Sadok

ORCID: 0000-0001-5378-4732
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • Peer-to-Peer Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Software System Performance and Reliability
  • Distributed systems and fault tolerance
  • Network Packet Processing and Optimization
  • Wireless Networks and Protocols
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Service-Oriented Architecture and Web Services
  • Image and Video Quality Assessment
  • Context-Aware Activity Recognition Systems
  • Wireless Communication Networks Research
  • Energy Efficient Wireless Sensor Networks
  • Mobile Agent-Based Network Management
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Network Optimization
  • Advanced Optical Network Technologies
  • Bluetooth and Wireless Communication Technologies

Universidade Federal de Pernambuco
2015-2024

Universidade de Pernambuco
2008-2024

Universidade Federal do Pará
2024

Ericsson (Sweden)
2024

Network Group (Czechia)
2022

Xi'an Railway Survey and Design Institute
2018

Universidade Federal Rural de Pernambuco
2017

Fresti (Portugal)
2016

Hospital das Clínicas da Universidade Federal de Pernambuco
2013-2015

Centro de Estudos e Sistemas Avançados do Recife
2015

The area of Internet traffic measurement has advanced enormously over the last couple years. This was mostly due to increase in network access speeds, appearance bandwidth-hungry applications, ISPs' increased interest precise user profile information and also a response enormous growth number connected users. These changes greatly affected work service providers administrators, which have deal with increasing resource demands abrupt brought by new applications. survey explains main...

10.1109/surv.2009.090304 article EN IEEE Communications Surveys & Tutorials 2009-01-01

In a cloud computing environment, dynamic resource allocation and reallocation are keys for accommodating unpredictable demands and, ultimately, contribute to investment return. This article discusses this process in the context of distributed clouds, which seen as systems where application developers can selectively lease geographically resources. highlights categorizes main challenges inherent particular offering stepwise view that covers initial modeling phase through optimization phase.

10.1109/mnet.2011.5958007 article EN IEEE Network 2011-01-01

Cloud Computing has been used by different types of clients because it many advantages, including the minimization infrastructure resources costs, and its elasticity property, which allows services to be scaled up or down according current demand. From provider point-of-view, there are challenges overcome in order deliver that meet all requirements defined Service Level Agreements (SLAs). High availability one biggest for providers, can improve a service, such as checkpointing, load...

10.1186/s13677-016-0066-8 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2016-10-18

The Internet of Things has the potential transforming health systems through collection and analysis patient physiological data via wearable devices sensor networks. Such can offer assisted living services in real-time a range multimedia-based services. However, service downtime, particularly case emergencies, lead to adverse outcomes worst case, death. In this paper, we propose an e-health monitoring architecture based on sensors that relies cloud fog infrastructures handle store data....

10.1186/s13677-018-0118-3 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2018-09-18

This work surveys Internet of Things (IoT) experimental research published since 2015. We summarize the IoT state art during last 2 years and extract important data that we apply to enhance analysis solutions. The scenario presents a promising universe analysis. raises number questions: which are its most popular applications? What is definition scale in an application? sensors more often used for what How can researcher compare scenarios? To investigate these concerns, this survey analyzes...

10.1186/s13173-019-0085-7 article EN cc-by-nc Journal of the Brazilian Computer Society 2019-02-27

Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however considerable challenge the hardware used often shows serious processing energy limitations. This work evaluates impact mechanism on nodes network whole. Hence actual measurements were undertaken real platform order accurately establish consumption for various encryption algorithms; well baseline scenario...

10.1109/icw.2005.47 article EN 2005-10-12

10.1016/j.engappai.2025.110495 article EN Engineering Applications of Artificial Intelligence 2025-03-18

COVID-19 is a pandemic characterized by uncertainty not only in transmission and pathogenicity, but also disease-specific control options. Despite many governmental measures, the disease spreading countries, public health system close to be collapsed. Alternative techniques should taken order minimize negative impacts on society. This work presents preliminary results of deep learning models classify positive based X-ray images. We provide binary classification (COVID-19 vs healhty,...

10.1109/tla.2021.9451232 article EN IEEE Latin America Transactions 2021-06-01

IoT devices suffer from resource limitations, such as processor, RAM, and disc storage. These limitations become more evident when handling demanding applications, deep learning, well-known for their heavy computational requirements. A case in point is robot pose estimation, an application that predicts the critical points of desired image object. One way to mitigate processing storage problems compressing learning application. This paper proposes a new CNN estimation while applying...

10.48550/arxiv.2205.13272 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Distributed Clouds, or just D-Clouds, can be seen as a paradigm that is able to exploit the potential of sharing resources across geographic boundaries and provide latency-bound allocation third-party developers. The representation D-Cloud challenge involves careful choice characteristics drive mapping requests on substrate resources. Regarding these problems, this paper introduces Cloud Modeling Language (CloudML), vendor-neutral XML-based language intended integrate description different...

10.1109/cloudcom.2011.60 article EN 2011-11-01

The Internet of Things (IoT) application development is a complex task that requires wide range expertise. Currently, the IoT community lacks toolkit enables inexperienced developers to develop prototypes rapidly. Filling this gap, we propose based on model-driven approach, called Link. Link allows compose mash up applications through graphical domain-specific language can be easily configured and wired together create an application. Through visual components, encapsulates complexity...

10.1109/uic-atc-scalcom.2014.95 article EN 2014-12-01

Current Internet transport protocols are being revisited in an attempt to respond traffic growth size, diversity and the emergence of new applications. Designed reduce Web TCP latency connection establishment time, QUIC uses UDP defines its own congestion control. To verify some QUIC's performance claims, we carried out extensive set controlled experiments reflecting conditions by configuring various parameters, such as round trip time (RTT), packet loss ratio, web pages, caching....

10.1109/iscc.2018.8538687 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2018-06-01

Guaranteeing high levels of availability is a huge challenge for cloud providers. The authors look at the causes failures and recommend ways to prevent them minimize their effects when they occur.

10.1109/mc.2017.4041358 article EN Computer 2017-11-01

Despite of Cloud infrastructures can be used as High Performance Computing (HPC) platforms, many issues from virtualization overhead had kept them unrelated. However, with advent container-based virtualizers, this scenario acquires new perspectives because technique promises to decrease the overhead, achieving a near-native performance. In work, we analyzed performance solution - Linux Container (LXC) against hyper visor-based KVM under HPC activities. For our experiments, considered CPU and...

10.1109/cisis.2015.53 article EN 2015-07-01

Internet service providers (ISP) have been recently relying on deep packet inspection (DPI) systems, which are the most accurate techniques for traffic identification and classification. However, building high performance DPI systems requires an in-depth careful computing system design due to memory processing power demands. DPI's accuracy mostly depends string matching process regular expression heuristics that go down payloads in a search networked application signatures. As ISPs backbone...

10.1109/infcomw.2009.5072188 article EN 2009-04-01
Coming Soon ...